1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mariana [72]
3 years ago
11

For Windows 9x and Windows NT operating systems, which authentication protocol should be used that protects the authentication p

rocess through the use of a secure channel for logon purposes?
Computers and Technology
1 answer:
inessss [21]3 years ago
4 0

Answer:

"NTLMv2" is the correct answer to this question.

Explanation:

The NTLMv2 authentication is a login information-based user protection method. The NT(new technology) version 4.0 in window servers with SP4 was designed to replace NTLMv1 with an increase in cryptography.

It offers a mechanism for authentication, that supports the verification process by using a cryptographic signature for logon, that's why NTLMv2 authentication is the correct answer.

You might be interested in
In which two places are a keyboard usually held on a laptop?
Margarita [4]

Answer:

Bottom of the case

Through a connector

Explanation:

Regularly we must see the bottom of the case to remove some screws, and then move the keyboard, but first, you have to remove a connector.

The keyboards have evolved from windows and IMB built their own keyboards for desktop, and now we have digital keyboards, and replace a keyboard in a laptop can change for the model or the size.

6 0
3 years ago
To move the insertion point to another location on the screen, users can use: the clipboard click to type arrow keys scroll bars
slega [8]

Answer:

arrow keys

Explanation:

duh

5 0
3 years ago
Which of the following functions needed to implement the information security program evaluates patches used to close software v
solong [7]

Answer:

a. Systems testing

Explanation:

According to my research on information technology, I can say that based on the information provided within the question the term being defined is called System Testing. Like mentioned in the question, this is a technique used in order to evaluate the complete system the system's compliance against specified requirements, which tests its functionalities from an end-to-end perspective in order to evaluates patches used to close software vulnerabilities and make sure it complies with all policies.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
2 years ago
Assume the following two classes as Person and Working: class Person { int personID, age; String fName, middleName, lastName; ..
Troyanec [42]

Answer:

A)

This is an example of tight coupling since the class Working has to have an idea of how Person is implemented to complete its own implementation.

B)

Any change in the Person class would require a change in the working class too.

C)

CODE

class Person {

int personID, age;

String fName, middleName, lastName;

public int getAge() {

return age;

}

}

// end of Person class

class Working extends Person {

boolean isUnderEighteen() {

if (super.getAge() <18) {

System.out.println("The person is under age and cannot work");

return true;

}

else {

System.out.println("The person can legitimately work");

return false;

}

}

}

Explanation:

4 0
3 years ago
I NEED TO FIND OUT THE ANSWER!
vladimir1956 [14]

Answer:

the first action that should be taken is to back up the all important document that and by finishing doing that format the entire system...and i advise you should be choosing the best antivirus to protecting your computer

7 0
2 years ago
Other questions:
  • What does a network backbone do? allows data to be delivered more quickly and efficiently makes data transfer from the cloud mor
    14·2 answers
  • Which payment type is best if you are trying to sick to a budget?
    15·1 answer
  • What does a professional programmer usually do first to gain an understanding of a problem?
    12·2 answers
  • How can supply and demand for different careers affect job stability and income?
    6·1 answer
  • Don't pat any attention to this
    7·2 answers
  • How to adjust screen from 1024x728 to 800x600
    6·1 answer
  • Which of the following is non-volatile storage?
    6·1 answer
  • the two main ways in which marketers address the competition with their strategies are by satisfying a need better than a compet
    6·2 answers
  • what social media application that affect our day to day activities, and how did it improve our skill
    9·1 answer
  • Write an application that displays the strings in the provided array alphabetically in ascending order.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!