1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mariana [72]
2 years ago
11

For Windows 9x and Windows NT operating systems, which authentication protocol should be used that protects the authentication p

rocess through the use of a secure channel for logon purposes?
Computers and Technology
1 answer:
inessss [21]2 years ago
4 0

Answer:

"NTLMv2" is the correct answer to this question.

Explanation:

The NTLMv2 authentication is a login information-based user protection method. The NT(new technology) version 4.0 in window servers with SP4 was designed to replace NTLMv1 with an increase in cryptography.

It offers a mechanism for authentication, that supports the verification process by using a cryptographic signature for logon, that's why NTLMv2 authentication is the correct answer.

You might be interested in
What is an example of a situation in which you might use the append method? In what ways is the append method limited?
Oksanka [162]
If I had an array of the names of people who just walked in the door. I’d append the name of the person who came in next. To update the array.

The append method needs to be looped through to add multiple inputs
5 0
2 years ago
Which recovery method allows users to back up their personal files to an external drive or network share without administrative
GarryVolchara [31]

Answer:

File history

Explanation:

File history recovery method  allows users to back up their personal files to an external drive or network share without administrative assistance. File History is a backup program that holds your personal files saved in the directories archives, desktop, favorites, and Contacts. It searches the file system regularly for changes, and copies modified files to a different location.

8 0
3 years ago
My monitor is a 60hz, and i overclocked it to 80hz. The max it will go is to 85hz, but i left it at 80hz. Will it damage my moni
Angelina_Jolie [31]

Answer:

No, It will not. but sometimes when you do the overclock the monitor may not have fast enough pixel response time. you might notice some tearing in the image. but will not do any permit damage

Explanation:

my display is overclocked from 60hz to 75hz (the max)

6 0
2 years ago
The five major functional areas consist of the Command Staff as a whole and the four sections in the General Staff: Operations,
inn [45]

The five major functional areas consist of the Command Staff as a whole and the four sections in the General Staff: Operations, Planning, Logistics, and Finance and Administration. Of these, the planning section consists of resource unit, situation unit, demobilization unit, and the documentation unit.

<u>Explanation:</u>

The Resource unit looks after the allocation, analysis, and organization of resources.

The situation unit collects information about The status of a particular incident that takes place in an organization.

The Demobilization unit is responsible for preparing a demobilization plan. It is responsible for the safety of persons and machines in case of any incident.

The Documentation unit looks after all the documents and prepares them on time.

8 0
2 years ago
Help I don’t even know what class is this.
kvv77 [185]

Answer:

I would say D

Explanation:

7 0
2 years ago
Other questions:
  • The main thing that adjusting the aperture controls when taking an image is?
    15·1 answer
  • Which document would most likely be written in an informal style?
    12·1 answer
  • what tool can a student use to make sure his or her work paper does not take credit for someone else's work ?
    5·1 answer
  • The spreadsheet ends after you reach column Z and row 99. True or false
    12·1 answer
  • I have lost the watch (that,which) you gave me​
    12·1 answer
  • Convert hexadecimal number 1AF2 to a decimal number.
    7·1 answer
  • A subroutine may be used to refer to which of the following? Check all that apply.
    15·2 answers
  • Which heading function is the biggest?<br> 1. h1<br> 2. h2<br> 3. h3
    7·2 answers
  • Suppose in an Excel spreadsheet, the value in cell A1 is 25. By using the Macabacus local currency cycle shortcuts (Ctrl + Shift
    10·1 answer
  • Which of the following offers a combination of the features of ram and rom?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!