answersLogoWhite

0


Best Answer

CHAP

User Avatar

Wiki User

13y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Which authentication method uses a challenge and a response to authenticate the user over the network?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What is used to authenticate Clints and servers to the network in Windows XP?

Network Level Authentication is used to authenticate Clients and servers to the network in Windows XP. It is also used to establish a remote desktop connection.


What service allows users to authenticate to a network?

There are different ways for a network to ensure the person is who he is suppose to be, ie. authenticate. The most common way is to ask for a user name and password for authentication. This is not set up by a service, but rather by the network administrator. He/she has permission to go into control panel/User Groups and set up the authentication process is for that software. Another way is by registering the MAC address of the computer in the network.


Which standard is used to authenticate users before they gain access to a network?

For this purpose a standardization body IETF is present. there you can find number of RFCs for authentication techniques and methods. you can also checkout ietf.org


What computer is responsible for providing authentication and authorization services on an active directory network?

Any Domain controller (server in the domain and ad installed on it) can authrorize and authenticate the user. If there is any password related issue, the information is sent to the PDC.There is one PDC role holder server in the domain which delegates other DCs to authorirze and authenticate in domain


Open or shared network authentication?

Open


What are 3 types of authentication used to access a wireless network?

There are many types of authentications can be used in access wireless network. mainly 3 types are used: User only Authentication, Device Only Authentication, User+Device Authentication. They are self explanatory.


What is access control method used on networks?

NAC is a centralised method for controlling network security.It is based on the following procedures.Detect - Detection and identification of new devices connecting to the network Authenticate - Authentication of users and/or devices Assess - Assessment of end systems regarding their compliance and/or vulnerabilities Authorise - Authorisation to use the network based on the results of the authentication and the assessmentMonitor - Monitoring users and devices once they are connected to the network Contain - Quarantine problem end systems and/or users to prevent them from negatively impacting the overall network environmentRe-mediate - Re-mediation of problems with the end system and/or user


What are the two SQL server authentication methods?

I think one is database server authentication, the other is operating system level authentication (could be at the network level).


What can L2TP do for someone's network?

L2TP is a tunneling protocol for an IP network. L2 data is transmitted over the network but has no encryption or authentication abilities. This type of protocol is usually paired with IPSec to provide encryption and authentication.


When was Food Network Challenge created?

Food Network Challenge was created in 2005.


Which type of service is designed to keep track of who is logging on to the network and which network services are available?

authentication


Which type of server is designed to keep track of who is logging on to the network and which network services are available?

authentication