EMERGING TRENDS IN COMPUTING
CLOUD COMPUTING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
An authentication protocol that can operate over PPP but serves only as the framework and does not perform encryption or authentication on its own.
|
PAP
|
|
CHAP
|
|
RADIUS
|
|
EAP
|
Explanation:
Detailed explanation-1: -EAP-PSK Easily the most popular form of authentication used in wireless networks today, EAP-PSK (Personal Shared Key) is nothing more than a shared secret code thats stored on both the wireless access point and the wireless client, encrypted using the powerful AES encryption ( Figure 11-27 ).
Detailed explanation-2: -EAP-Protected Extensible Authentication Protocol (EAP-PEAP) is a protocol that creates an encrypted (and more secure) channel before the password-based authentication occurs.
Detailed explanation-3: -PPP authentication is required for dial-in connectivity. Any of the three standard mechanisms—PAP, CHAP, and EAP—can be used.
There is 1 question to complete.