Kerberos
Chap (Challenge Handshake Authentication Protocol)
Kerberos
http://en.wikipedia.org/wiki/Kerberos_(protocol) Why ask a question when you can more easily and quickly read the answer on wikipedia? This is true for a large majority of questions that start with "What is"
MS-CHA
Kerberos Version 5 is standard on all versions of Windows 2000 and ensures the highest level of security to network resources. The Kerberos protocol name is based on the three- headed dog figure from Greek mythology known as Kerberos. The three heads of Kerberos comprise the Key Distribution Center (KDC), the client user and the server with the desired service to access. The KDC is installed as part of the domain controller and performs two service functions: the Authentication Service (AS) and the Ticket-Granting Service (TGS). three exchanges are involved when the client initially accesses a server resource:AS ExchangeTGS ExchangeClient/Server (CS) Exchange
No. It does perform authentication, but the password is sent to the server in clear text; this means that anyone with ample knowledge and access to your network or any network between you and the server could grab this information.
I think one is database server authentication, the other is operating system level authentication (could be at the network level).
NTLM
SQL Authentication Windows Authentication (Domain)
Ftp is a file transfer protocol use with TCP/IP Protocol to transfer files directly to a server through the internet.
EAP
There is no single protocol used between a server and a client; the protocol depends on what the server and client are doing and how they are currently communicating.