Multiple Choice
All forms of NTLM use the ____.
A) challenge-response protocol
B) Internet Key Exchange
C) tunnel mode
D) public key encryption
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q2: _ is a command-line utility that allows
Q3: Along with providing file security through Access
Q4: The _ is responsible for managing the
Q5: _ involves the malicious modification of data
Q6: _ involves users who deny that they
Q7: The Monitoring section of the WFAS console
Q8: _ provides authentication and integrity services but
Q9: List three authentication protocols supported by Windows
Q10: List four areas that you are allowed
Q11: Briefly discuss the two phases used by