www.howtonetwork.org

CCNA & CCNP Certifcation Training

  • About
  • Contact
  • FAQ
  • Join
  • Home
  • CCNA
    • ICND1
    • ICND2
    • 101 CCNA LABS
  • CCNP
    • ROUTE
    • SWITCH
    • TSHOOT
    • 101 CCNP LABS
  • CompTIA
    • Security+
    • Network+
  • Design
    • CCDA
    • CCDP
You are here: Home / CompTIA / Network+ / Section V: Network Security / Chapter 29: User Authentication / Summary

Summary

User authentication is a fundamental component of security policies across the network. From a user’s perspective, this can be accomplished in multiple ways:

  • Username and password
  • Token generators
  • Fingerprint readers
  • A combination of multiple factors

The PKI (Public Key Infrastructure) is a complex authentication technique that functions using digital certificates. These certificates provide a certain level of trust to the communication, as they authenticate the sender. The PKI uses the concept of Certificate Authority (CA) for the central entity that issues certificates to users. The CA confirms the identity . . .

The content below this message is for members only.

About Us

This is a free bonus site for members of www.howtonetwork.com

Copyright

The content on this copyright Reality Press Ltd.
Copyright Reality Press Ltd.