Multiple Choice
All forms of NTLM use the ____.
A) challenge-response protocol
B) Internet Key Exchange
C) tunnel mode
D) public key encryption
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q23: The term _ refers to a form
Q24: _ involves the capture of network traffic
Q27: _ provides hard drive-based encryption of servers
Q29: With _, each user has a public
Q30: For each transaction, IPSec uses the _
Q31: A _ is a microchip that performs
Q32: _ attacks are performed by flooding a
Q33: A(n)_ attack involves placing a computer between
Q35: Windows Server 2008 has two tools for
Q39: EFS uses a combination of private and