ISC Exam Questions

Which of the following protocols is used to compare two values calculated using the Message Digest (

Which of the following protocols is used to compare two values calculated using the Message Digest
(MD5) hashing function?

A.
CHAP

B.
PEAP

C.
EAP

D.
EAP-TLS

Explanation:
Challenge Handshake Authentication Protocol (CHAP) involves comparison of two
values calculated using the Message Digest (MD5) hashing
function. Challenge Handshake Authentication Protocol (CHAP) is an authentication protocol that
uses a secure form of encrypted
authentication. Using CHAP, network dial-up connections are able to securely connect to almost all
PPP servers.
Answer option C is incorrect. Extensible Authentication Protocol (EAP) is an authentication protocol
that provides support for a wide range of
authentication methods, such as smart cards, certificates, one-time passwords, public keys, etc. It is
an extension to Point-to-Point Protocol
(PPP), which allows the application of arbitrary authentication mechanisms for the validation of a
PPP connection.
Answer option D is incorrect. Extensible Authentication Protocol-Transport Level Security (EAP-TLS)
is an authentication protocol, which
provides mutual authentication, integrity-protected negotiation of cryptographic service providers,
and a secret key exchange between two
systems that use public key cryptography. EAP-TLS works on a network that is configured for public
key infrastructure (PKI) and uses
certificates for authentication. These certificates can be stored on computers or on smart cards.
Answer option B is incorrect. The Protected Extensible Authentication Protocol, also known as
Protected EAP or simply PEAP, is a protocol that
encapsulates EAP within an encrypted and authenticated Transport Layer Security (TLS) tunnel. The
purpose was to correct deficiencies in
EAP; EAP assumed a protected communication channel, such as that provided by physical security.