CWNP Exam Questions

Which of the following protocols is used to compare two values calculated using the Message Digest (

Which of the following protocols is used to compare two values calculated using the Message Digest (MD5) hashing function?

A.
EAP-TLS

B.
CHAP

C.
EAP

D.
PEAP

Explanation:
Challenge Handshake Authentication Protocol (CHAP) involves comparison of two values calculated using the Message Digest (MD5) hashing function. Challenge Handshake Authentication Protocol (CHAP) is an authentication protocol that uses a secure form of encrypted authentication. Using CHAP, network dial-up connections are able to securely connect to almost all PPP servers. Answer option C is incorrect. Extensible Authentication Protocol (EAP) is an authentication protocol that provides support for a wide range of authentication methods, such as smart cards, certificates, one-time passwords, public keys, etc. It is an extension to Point-to-Point Protocol (PPP), which allows the application of arbitrary authentication mechanisms for the validation of a PPP connection. Answer option A is incorrect. Extensible Authentication Protocol-Transport Level Security (EAP-TLS) is an authentication protocol, which provides mutual authentication, integrity-protected negotiation of cryptographic service providers, and a secret key exchange between two systems that use public key cryptography. EAP-TLS works on a network that is configured for public key infrastructure (PKI) and uses certificates for authentication. These certificates can be stored on computers or on smart cards. Answer option D is incorrect. The Protected Extensible Authentication Protocol, also known as Protected EAP or simply PEAP, is a protocol that encapsulates EAP within an encrypted and authenticated Transport Layer Security (TLS) tunnel. The purpose was to correct deficiencies in EAP; EAP assumed a protected communication channel, such as that provided by physical security.
Reference: http://en.wikipediA.org/wiki/Challenge-handshake_authentication_protocol