CHAP provides a secure authentication routine by having both ends of the authentication process perform a(n) _______________ on a shared secret, and having the initiator send the result of this rather than a cleartext password.
Fill in the blank(s) with the appropriate word(s).
hash
correct
Computer Science & Information Technology
You might also like to view...
A(n) ________ is a feature in Microsoft Office programs that walks you step-by-step through a process
Fill in the blank(s) with correct word
Computer Science & Information Technology
Objects, or more precisely the ________ objects come from, are essentially reusable software components.
a. methods. b. packages. c. APIs. d. classes.
Computer Science & Information Technology