1. Which of the following algorithms can be used to generate a message digest (choose all that apply)?
a. Kerberos
b. MD5
c. 802.1X
d. EAP
e. SHA
2. The PKI (Public Key Infrastructure) is a complex authentication technique that functions using digital certificates (true or false).
a. True
b. False
3. Which of the following encryption types uses a different key for the encryption and decryption processes?
a. Symmetric
b. Extended
c. Asymmetric
d. None of the above
4. EAP-TLS (EAP-Transport Layer Security) is a commonly used EAP method in wireless environments that . . .
The content below this message is for members only.