What are two characteristics of Challenge-Handshake Authentication Protocol (CHAP)? (Choose two.)
A.
CHAP uses a hash mechanism so the clear text authentication piece is never sent.
B.
CHAP uses a parity algorithm to jumble the credentials for security.
C.
CHAP uses a Point-to-Point Protocol (PPP) method.
D.
CHAP is required for iSCSI initiator authentication.
C and
0
0