Administering Windows Server Hybrid Core Infrastructure (AZ-800) Practice

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the AZ-800 exam with our comprehensive practice quiz. Test your knowledge with multiple-choice questions and detailed explanations. Enhance your skills in Windows Server Hybrid Core Infrastructure to excel in your certification exam!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


What does CHAP stand for in the context of iSCSI authentication?

  1. Challenge Handshake Authentication Protocol

  2. Charity Handshake Authentication Protocol

  3. Character Handshake Authentication Protocol

  4. Clear Handshake Authentication Protocol

The correct answer is: Challenge Handshake Authentication Protocol

CHAP stands for Challenge Handshake Authentication Protocol in the context of iSCSI authentication. This protocol is widely used for providing secure authentication over a network. It works by using a challenge-response mechanism to verify the identity of a user or device without sending the actual password over the network. In this process, the server sends a challenge (a random number) to the client, which then uses this challenge along with its stored password to create a hashed value. The client sends this hash back to the server, which then performs the same hash operation using its record of the password. If the two hashed values match, the client is authenticated. This method enhances security since the actual password is not transmitted, reducing the risk of password theft. The other options, although sounding plausible, do not represent established authentication protocols related to iSCSI. There is no recognized protocol by the names Charity Handshake Authentication Protocol, Character Handshake Authentication Protocol, or Clear Handshake Authentication Protocol in this context, making the understanding of CHAP fundamental to any discussion on iSCSI authentication strategies.