CHAP provides a secure authentication routine by having both ends of the authentication process perform a(n) _______________ on a shared secret, and having the initiator send the result of this rather than a cleartext password.

Fill in the blank(s) with the appropriate word(s).

hash

correct

Computer Science & Information Technology

You might also like to view...

A(n) ________ is a feature in Microsoft Office programs that walks you step-by-step through a process

Fill in the blank(s) with correct word

Computer Science & Information Technology

Objects, or more precisely the ________ objects come from, are essentially reusable software components.

a. methods. b. packages. c. APIs. d. classes.

Computer Science & Information Technology