You work as the security administrator at Certpaper .com. You must implement an authentication
protocol that uses only encrypted passwords during the authentication process.
Choose the authentication protocol that accomplishes this.
A.
Kerberos
B.
SMTP (Simple Mail Transfer Protocol)
C.
PPTP (Point-to-Point Tunneling Protocol)
D.
CHAP (Challenge Handshake Authentication Protocol)
Explanation:
CHAP is commonly used to encrypt passwords. It provides for on-demand authentication within an
ongoing data transmission, that is repeated at random intervals during a session. The challenge
response uses a hashing function derived from the Message Digest 5 (MD5) algorithm.