COMPUTER FUNDAMENTALS

EMERGING TRENDS IN COMPUTING

CLOUD COMPUTING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
An authentication protocol that can operate over PPP but serves only as the framework and does not perform encryption or authentication on its own.
A
PAP
B
CHAP
C
RADIUS
D
EAP
Explanation: 

Detailed explanation-1: -EAP-PSK Easily the most popular form of authentication used in wireless networks today, EAP-PSK (Personal Shared Key) is nothing more than a shared secret code thats stored on both the wireless access point and the wireless client, encrypted using the powerful AES encryption ( Figure 11-27 ).

Detailed explanation-2: -EAP-Protected Extensible Authentication Protocol (EAP-PEAP) is a protocol that creates an encrypted (and more secure) channel before the password-based authentication occurs.

Detailed explanation-3: -PPP authentication is required for dial-in connectivity. Any of the three standard mechanisms—PAP, CHAP, and EAP—can be used.

There is 1 question to complete.