Review Questions

1:What are VSAs?
2:What types of messages does the RADIUS protocol use in the authentication process?
3:What types of information are relayed from the RADIUS server during RADIUS authorization?
4:Which hashing algorithm is used to encrypt user passwords?
5:What is the Authenticator Request field?
6:What types of attributes can the Access-Reject packet carry?

Get Network Security Principles and Practices now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.