Which of these is an authentication protocol that uses a hashed version of a user's password so that the user's credentials are not sent over the wire in clear text?

a. Password Authentication Protocol
b. Challenge Handshake Authentication Protocol
c. Protected Extensible Authentication Protocol-Transport Layer Security
d. None of the above

B. Password Authentication Protocol (PAP) sends the user's credentials over the wire in clear text and can easily be sniffed off of the wire by an attacker. Protected Extensible Authentication Protocol-Transport Layer Security (PEAP-TLS) is a remote access authentication and security protocol that provides an encrypted authentication channel, dynamic keying material from TLS, fast reconnect using cached session keys, and server authentication that protects against the setup of unauthorized access points.

Computer Science & Information Technology

You might also like to view...

Which of the following operation security controls help mitigate the impact of a loss?

A. Preventive controls B. Detective controls C. Corrective controls D. Deterrent controls

Computer Science & Information Technology

The ____ summary function estimates the standard deviation of all of the data to be summarized in a PivotTable report.

A. Sum B. Varp C. StdDev D. Product

Computer Science & Information Technology