You may not know it, but your network is probably unsecured right now. Anyone with the right tools could capture, manipulate, and add data between the connections you maintain with the internet. The security cat and mouse game isn't one sided, however. Network administrators are currently taking advantage of Kerberos to help combat security concerns.
one way authentication and mutual authentication
Chap (Challenge Handshake Authentication Protocol)
CHAP (Challenge Handshake Authentication Protocol) The CHAP provides protection against palyback attack by the peer also requires both the client and server.
In computing, CHAP, or Challenge-Handshake Authentication Protocol, is used to authenticate a user who is attempting to connect onto another system.
Kerberos
Windows 2000/XP uses Kerberos. A+ Guide to managing and maintaing you PC pg. 1035 Winddows xp used to authentication protocol to enctypt account name and password . the most popular protocols are Challenge handshake authentication protocol and kerberos is the default used by windows 2000/ xp . When the user login to the network the username and the password must passed over the network in order to be authenticated by the domain controller.
http://en.wikipedia.org/wiki/Kerberos_(protocol) Why ask a question when you can more easily and quickly read the answer on wikipedia? This is true for a large majority of questions that start with "What is"
Kerberos
Challange Handshake Authentication Protocol
kerberos version 5 NTLM protocols are used by AD
Kerberos
At initial connection and at random intervalsAnswer Explanation: The Challenge Handshake Authentication Protocol was formed to protect against attacks. A server sends a "challenge" to the client computer when first connecting. The computer then responds to the "challenge" by combining it with it's own password. It then sends this to the server, which studies it by making a hash value of its own and comparing the two hash values. If they're are equal, then the connection is established. This is repeated at random times to prevent against attacks. The other options are wrong. The "handshake" happens at the first connection and at random intervals. It doesn't happen at the end of the connection.