Match each item with an statement below:
A. a randomly chosen value.
B. handles some CA tasks such as processing certificate requests and authenticating users.
C. basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
D. authentication system developed by the Massachusetts Institute of Technology (MIT).
E. Microsoft implementation of CHAP.
F. secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
G. management protocol that controls port-based authentication.
H. electronic files that the user has and are used to uniquely identify users and resources over networks.
I. starting point of the group key hierarchy.
A. Nonce
B. Registration authority (RA)
C. PAP
D. Kerberos
E. MS-CHAP
F. Password
G. EAP
H. Digital certificates
I. Group master key (GMK)
You might also like to view...
First line indents and double-spacing are used on a bibliography page in MLA style
Indicate whether the statement is true or false
When a citation field is inserted into a document, the sources stored in the Source Manager display in the ________
Fill in the blank(s) with correct word