Match each item with an statement below:

A. a randomly chosen value.
B. handles some CA tasks such as processing certificate requests and authenticating users.
C. basic authentication protocol that was used to authenticate a user to a remote access server or to an ISP.
D. authentication system developed by the Massachusetts Institute of Technology (MIT).
E. Microsoft implementation of CHAP.
F. secret combination of letters and numbers that validates (authenticates) a user by what he or she knows.
G. management protocol that controls port-based authentication.
H. electronic files that the user has and are used to uniquely identify users and resources over networks.
I. starting point of the group key hierarchy.

A. Nonce
B. Registration authority (RA)
C. PAP
D. Kerberos
E. MS-CHAP
F. Password
G. EAP
H. Digital certificates
I. Group master key (GMK)

Computer Science & Information Technology

You might also like to view...

First line indents and double-spacing are used on a bibliography page in MLA style

Indicate whether the statement is true or false

Computer Science & Information Technology

When a citation field is inserted into a document, the sources stored in the Source Manager display in the ________

Fill in the blank(s) with correct word

Computer Science & Information Technology