Which of the following protocols is used to compare two values calculated using the Message Digest (MD5) hashing function?

Which of the following protocols is used to compare two values calculated using the Message Digest
(MD5) hashing function?

Which of the following protocols is used to compare two values calculated using the Message Digest
(MD5) hashing function?

A.
CHAP

B.
PEAP

C.
EAP

D.
EAP-TLS

Explanation:
Challenge Handshake Authentication Protocol (CHAP) involves comparison of two
values calculated using the Message Digest (MD5) hashing
function. Challenge Handshake Authentication Protocol (CHAP) is an authentication protocol that
uses a secure form of encrypted
authentication. Using CHAP, network dial-up connections are able to securely connect to almost all
PPP servers.
Answer option C is incorrect. Extensible Authentication Protocol (EAP) is an authentication protocol
that provides support for a wide range of
authentication methods, such as smart cards, certificates, one-time passwords, public keys, etc. It is
an extension to Point-to-Point Protocol
(PPP), which allows the application of arbitrary authentication mechanisms for the validation of a
PPP connection.
Answer option D is incorrect. Extensible Authentication Protocol-Transport Level Security (EAP-TLS)
is an authentication protocol, which
provides mutual authentication, integrity-protected negotiation of cryptographic service providers,
and a secret key exchange between two
systems that use public key cryptography. EAP-TLS works on a network that is configured for public
key infrastructure (PKI) and uses
certificates for authentication. These certificates can be stored on computers or on smart cards.
Answer option B is incorrect. The Protected Extensible Authentication Protocol, also known as
Protected EAP or simply PEAP, is a protocol that
encapsulates EAP within an encrypted and authenticated Transport Layer Security (TLS) tunnel. The
purpose was to correct deficiencies in
EAP; EAP assumed a protected communication channel, such as that provided by physical security.



Leave a Reply 0

Your email address will not be published. Required fields are marked *