Which of the following authentication protocols makes use of a supplicant authenticator and authentication server?

C. Sending a PIN to a smartphone through text message

Self-service password reset (SSPR) is defined as any process or technology that allows users who have either forgotten their password or triggered an intruder lockout to authenticate with an alternate factor, and repair their problem, without calling the help desk. It is a common feature in identity management software and often bundled in the same software package as a password synchronization capability.
Typically, users who have forgotten their password launch a self service application from an extension to their workstation login prompt, using their own or another user's web browser, or through a telephone call. Users establish their identity, without using their forgotten or disabled password, by answering a series of personal questions, using a hardware authentication token, responding to a notification e-mail or, less often, by providing a biometric sample such as voice recognition. Users can then either specify a new, unlocked password, or ask that a randomly generated one be provided. One popular method is through SMS and email.

D. Federated authentication

Federated authentication is an arrangement that can be made between multiple enterprises to let subscribers use the same identification data to obtain access to the networks of all the enterprises in the group. The use of such a system is sometimes called identity federation.
Identity federation links a user's identity across multiple security domains, each supporting its own identity management system. When two domains are federated, the user can authenticate to one domain and then access resources in the other domain without having to perform a separate login process.
Identity federation offers economic advantages, as well as convenience, to enterprises and their network subscribers. Single sign-on (SSO) is an important component of identity federation, but it is not the same as identity federation. Identity federation involves a large set of user-to-user, user-to-application and application-to application use cases at the browser tier, as well as the service oriented architecture tier.
In order for federated authentication to be effective, the partners must have a sense of mutual trust. Authorization messages between partners in an federated identity management system can be transmitted using Security Assertion Markup Language (SAML) or a similar XML standard that enables a user to log on once for affiliated but separate websites or networks. Examples of federated authentication systems include OpenlD and OAuth, as well as Shibboleth, which is based on OASIS SAML

B. CN=company, CN=com, OU=netadmin, DC=192.32.10.233

LDAP stands for "Lightweight Directory Access Protocol". It is a simplification of the X.500 Directory Access Protocol (DAP) used to access directory information . A directory is essentially a special purpose database optimized to handle identity-related information. The LDAP standard also defines a data model based on the X.500 data model. It is a hierarchical data model, with objects arranged in a hierarchical structure, and each object containing a collection of attributes. The overall structure of any particular directory is defined by its schema, much like a database schema defines the tables and columns.
Managing users with LDAP. Use the Lightweight Directory Access Protocol (LDAP) registry to manage users. LDAP is a way to centralize the user management for multiple web applications in an LDAP Server that maintains a user registry. The means of defining these users and groups is the Access Control List (ACL).
A directory service has two major features. First, it distributes its information base among many different servers. Second, users can access directory information by querying any of those servers. Making this work requires defining a namespace in which each object's location can be quickly determined.
A name that includes an object's entire path to the root of the LDAP namespace is called its distinguished name, or DN. An example DN for a user named TJones whose object is stored in the cn=Users container in a domain named Company.com would be cn=TJones,cn=Users,dc=Company,dc=com

A. Biometric-based

Biometric authentication is a security process that relies on the unique biological characteristics of an individual to verify that he is who is says he is. Biometric authentication systems compare a biometric data capture to stored, confirmed authentic data in a database. If both samples of the biometric data match, authentication is confirmed.
Typically, biometric authentication is used to manage access to physical and digital resources such as buildings, rooms and computing devices.
Biometrics seems secure on the surface. After all, you are the only one with your ears, eyes, and fingerprint. However, that does not necessarily make it more secure than passwords. A password is inherently private because you are the only one who knows it. Of course, hackers can acquire it by brute force attacks or phishing, but generally, people cannot access it. On the other hand, biometrics is inherently public.
Think about it: your ears, eyes, and face are exposed. You reveal your eyes whenever you look at things. With fingerprint recognition, you leave fingerprints everywhere you go. With voice recognition, someone is recording your voice. Essentially, there is easy access to all these identifiers.
Your image is stored in more places than you realize. Not only does Facebook recognize your face, but every store you visit records and saves your image in its database to identify you and analyze your buying habits. In fact, it is legal in 48 states to use software to identify you using images taken without your consent for commercial purposes. In addition, law enforcement agencies nationwide can store your image without consent.
The problem is identity management and security. Personal identifiable information (PII) needs to have access control in place to protect from identity theft. All it takes is for a hacker to breach any of those databases to leak and steal your biometric identification.

Which of the following authentication protocols uses certificates for authentication?

EAP-TLS uses encrypted certificates for authentication. It also supports mutual authentication, similar to MS-CHAP v2. This is considered the most secure authentication protocol supported by Windows Server 2003.

Which of the following encryption protocols uses a PSK?

PSK is one of two available authentication methods used for WPA and WPA2 encryption on Juniper Networks wireless networks.

What is authentication protocol in cryptography?

An authentication protocol is a type of computer communications protocol or cryptographic protocol specifically designed for transfer of authentication data between two entities.

Which authentication protocol is more secure?

Extensible Authentication Protocol (EAP) When used for wireless communications, EAP is the highest level of security as it allows a given access point and remote device to perform mutual authentication with built-in encryption.