Completion requirements
Four methods of authentication and authorization are discussed in this video. The four methods are password authentication protocol (PAP), challenge handshake authentication protocol (CHAP), Microsoft CHAP (MS-CHAP), and extensible authentication protocol (EAP). While watching this video pay attention to the method of authentication used by each protocol. Which method is the least secure and why? Which method is proprietary?
Source: PaceIT Online, https://www.youtube.com/watch?v=c2-dB85B7CI This work is licensed under a Creative Commons Attribution 3.0 License.
Last modified: Wednesday, 7 August 2024, 2:19 PM