a company's it manager has advised the business's executives to use a method of decentralized access control rather than centralized to avoid creating a single point of failure. she selects a common protocol that hashes passwords with a one-time challenge number to defeat eavesdropping-based replay attacks. what is this protocol?

Respuesta :

Lanuel

A common protocol that hashes passwords with a one-time challenge number to defeat eavesdropping-based replay attacks is generally referred to as Challenge-Handshake Authentication Protocol (CHAP).

What is a password?

In Computer technology, a password can be defined as a string of characters, phrase or word that is designed and developed to distinguish an unauthorized user from an authorized user, especially through an identification and authentication process.

What is a protocol?

A protocol can be defined as a formatted blocks of data that have been designed and established by professionals to obey a set of standard rules (conventions) such as the following:

  1. Secure Remote Password protocol (SRP).
  2. Augmented password-authenticated key exchange (PAKE) protocol.
  3. Challenge-Handshake Authentication Protocol (CHAP).

In conclusion, the Challenge-Handshake Authentication Protocol (CHAP) is a common protocol that is designed and developed as a one-time challenge number in order to defeat an attacker that adopts eavesdropping-based replay attacks techniques.

Read more on protocols here: brainly.com/question/17387945

#SPJ1

ACCESS MORE