Question: pts A company's IT manager has advised the business's executives to use a method of decentralized access control rather than centralized to avoid creating a
pts
A company's IT manager has advised the business's executives to use a method of decentralized access control rather than centralized to avoid creating a single point of failure. She selects a common protocol that hashes passwords with a onetime challenge number to defeat eavesdroppingbased replay attacks. What is this protocol?
ChallengeHandshake Authentication Protocol CHAP
Lightweight Directory Access Protocol LDAP
Kerberos
Password Authentication Protocol PAP
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
