Authentic Protocols Flashcards
(authentication) Authentication is confirming something that is _________ or true.
authentic
(authentication) In computers, authentication is the process of verifying the identity of a ____, such as a username or ________.
user, password
(authentication) In the world of networking, there are several protocols that are used to achieve authentication;
- PAP (Password Authentication Protocol)
- CHAP (Challenge Handshake Authentication Protocol)
- MS-CHAP (Microsoft Challenge Handshake Protocol)
- RADIUS (Remote Authentication Dial-In Service)
- Kerberos- Authentication
- EAP (Extensible Authentication Protocol)
(PAP) PAP stands for?
Password Authentication Protocol
(PAP) PAP is a simple authentication protocol that is compatible with just about __________.
everything
(PAP) But the downside to PAP is that it is not very ____. All sensitive data, like usernames and passwords, are sent in _____ ____.
safe, clear, text
(CHAP) Challenge Handshake Authentication Protocol or CHAP is a better alternative to PAP because it encrypts _________ and _________.
usernames, passwords
(CHAP) CHAP authenticates by the server asking or challenging the client to validate itself by using a _____-___ _________.
three, way, handshake
(CHAP) So, after a connection has been made, the server sends a challenge to the ______. Then, the client responds by using a one-way hash function with the ______. Then, the server checks the response against its own calculation, and if the value matches, then the authentication is ______.
client, answer, passed
(MS-CHAP) MS-CHAP is __________ version of CHAP.
Microsoft’s
(MS-CHAP) There are two versions of MS-CHAP:
MS-CHAP and MS-CHAP2.
(MS-CHAP) MS-CHAP is basically CHAP, so it only authenticates the ______.
client
(MS-CHAP) But MS-CHAP2 offers mutual ______________, both the client and the server are authenticated, so it’s more ______.
authentication, secure
(RADIUS) RADIUS stands for?
Remote Authentication Dial-In Service
(RADIUS) RADIUS is a protocol that enables a ______ ______, such as a domain controller, to handle all ______________.
single, server, authentication
(RADIUS) It allows a company to store ____ ______ ____ in a central location.
user, access, data
(RADIUS) Users log into the RADIUS server, and that makes the request on the user’s behalf after _____________.
authenticating
(Kerberos) Kerberos is an authentication protocol that was developed by MIT, and it authenticates by using _______.
tickets
(Kerberos) In order for a client to access network resources, it first authenticates itself with the Kerberos ______. Then, after authentication, the client is issued a ticket, which then gives the client access to the _______ __________.
server, network, resources
(EAP) EAP stands for __________ ______________ ________, and this is an extension to PPP.
Extensible, Authentication, Protocol
(EAP) It’s a general protocol that supports many methods of authentication, and the most common one that it’s associated with is _____ _____.
smart, cards