1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sineoko [7]
3 years ago
15

Which vpn protocol is a poor choice for high-performance networks with many hosts due to vulnerabilities in ms-chap?

Computers and Technology
1 answer:
blsea [12.9K]3 years ago
3 0
PPTP is what uses chap-secrets. So I imagine that's it
You might be interested in
_______________ is used by a hacker to mask intrusion and obtain administrator permissions to a computer.
Sergeu [11.5K]

Answer:

Rootkit.

Explanation:

Rootkit is a collection of software tools,mostly malicious.These are mostly used by hackers to obtain administrator permission to a computer by masking intrusion.

Root-kit is made from two word Root and kit.Where root refers to the name of privileged account on an operating system that is somewhat like unix and KIT refers to the tools used.

6 0
4 years ago
A group of computers that are interconnected order to share information or document is called a
Shkiper50 [21]
Group of computers that are interconnected in order to share information or documents is called <span>Computer network.



                                                            
Hope this helps.
</span>
5 0
3 years ago
Read 2 more answers
Which expression is equivalent to 3x + 3x + 3x?<br><br> From Performance Matters
mamaluj [8]
9x because you can add 3x+3x+3x because they are the same and can be added
3 0
3 years ago
Read 2 more answers
To erase an entire entry in a cell and then reenter the data from the beginning, press the ____ key.
Ratling [72]
You have to press the Backspace key.
8 0
4 years ago
The 10 IISSCC _____ cover 17 NIST control _____ which are arranged in three _____ called management, operational, and technical.
almond37 [142]

Answer:

Controls, families, domain

Explanation:

ISSCC means international information systems security certification consortium.

They are also known as ISC square, they offer two security certification the cissp and sccp.

7 0
3 years ago
Read 2 more answers
Other questions:
  • Which data type uses more memory an integer or an unsigned integer?
    6·1 answer
  • ​In addition to joint application development, another popular user-oriented method is _____, which resembles a condensed versio
    14·1 answer
  • How far from the bullet is text indented
    6·2 answers
  • Use the SAS dataset insure to create a dataset, work.insure10, that (a) only reads in the variables Name, Policy, Company, PctIn
    9·1 answer
  • Using the given definition of the Measurable interface: public interface Measurable { double getMeasure(); } Consider the follow
    10·1 answer
  • Ben Dover is the name of my best immature joke thank you
    7·2 answers
  • The concept of the internet was developed by the u.s. department of defense as a network that ________ in event of an attack.
    8·1 answer
  • Your sister is starting 9th grade next year and is thinking about going to college. What step would you recommend she take first
    7·2 answers
  • Searching for a particular record in a database is called “querying the data.”<br> True<br> False
    9·2 answers
  • Can you log into your account with another phone​
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!