Westonci.ca connects you with experts who provide insightful answers to your questions. Join us today and start learning! Join our Q&A platform to get precise answers from experts in diverse fields and enhance your understanding. Get detailed and accurate answers to your questions from a dedicated community of experts on our Q&A platform.

match each authentication protocol on the left with its unique characteristic on the right. (each protocol may be used more than once).

Sagot :

Below is the authentication protocol on the left with its unique characteristic on the right.

Sends a user's credentials over UDP:

Remote Authentication Dial-In Service (RADIUS)

Sends a user's credentials over TCP:

Terminal Access Controller Access-Control System (TACACS+)

Is an important part of Windows Active Directory:

Kerberos

Provides a trusted Key Distribution Center (KDC):

Kerberos

Only encrypts the password:

Remote Authentication Dial-In Service (RADIUS)

What is Authentication protocol?

An authentication protocol allows the receiving party (such as a server) to confirm another party's identity (such as a person using a mobile device to log in). To verify users, almost every computer system employs some form of network authentication.

To know more about Authentication protocol, visit: https://brainly.com/question/28593089

#SPJ4