COMPUTER NETWORKING

NETWORK SECURITY

INTRODUCTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which authentication method completes the following in order:logon request, encrypts value response, server, challenge, compare encrypts results, and authorize or fail referred to?
A
Security Tokens
B
Certificates
C
Kerberos
D
CHAP
Explanation: 

Detailed explanation-1: -Which authentication method completes the following in order: logon request, encrypts value response, server, challenge, compare encrypts results, and authorize or fail referred to? The Challenge Handshake Authentication Protocol, authenticates a suer or a network host to entities like Internet access providers.

Detailed explanation-2: -CAC cards are smart cards that are used for ID and authentication to systems. What is the most secure method of authentication and authorization in its default form? Kerberos is the most secure method of authentication listed.

Detailed explanation-3: -Which of the following authentication method can use location to authenticate a user? Attribute-based access control (ABAC) works on attributes instead of users or groups. For example, city and department could be two attributes of users. If both the attributes match, the user is granted access to the object.

Detailed explanation-4: -Multifactor authentication is when two or more types of authentication are used when dealing with user access control-for example, if a person needs to use a username and password and swipes a smart card.

Detailed explanation-5: -Security Keys utilize a secure challenge-and-response authentication system, which is based on public key cryptography. This system uses a pair of public and private keys to encrypt and decrypt data. The public key is used to encrypt the data, and the private key is used to decrypt it.

There is 1 question to complete.