1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mariana [72]
3 years ago
11

For Windows 9x and Windows NT operating systems, which authentication protocol should be used that protects the authentication p

rocess through the use of a secure channel for logon purposes?
Computers and Technology
1 answer:
inessss [21]3 years ago
4 0

Answer:

"NTLMv2" is the correct answer to this question.

Explanation:

The NTLMv2 authentication is a login information-based user protection method. The NT(new technology) version 4.0 in window servers with SP4 was designed to replace NTLMv1 with an increase in cryptography.

It offers a mechanism for authentication, that supports the verification process by using a cryptographic signature for logon, that's why NTLMv2 authentication is the correct answer.

You might be interested in
Which cell address indicates the intersection of the first row and the first column in worksheet?
Rzqust [24]

Answer:

A. A1

Explanation:

Worksheet's Columns are named with Alphabets. i.e. A,B,C,D,E....

And Worksheet's rows are named with numbers. i.e. 1,2,3,4,5....

So the intersection of first row number as "1" and First Column name as "A" is A1 as worksheet displays column name first and then row number.

8 0
3 years ago
Read 2 more answers
Which troubleshooting tool enables you to connect to a user's remote computer, view and interact with the user's screen, and cha
DaniilM [7]
That would be Remote assistance.
6 0
3 years ago
Which Excel file extension stores automated steps for repetitive tasks?
Marianna [84]

Excel Macros, or .xlsm, stores automated steps for repetitive tasks.

4 0
3 years ago
Read 2 more answers
Write a program that converts degrees Fahrenheit to Celsius using the following formula. degreesC = 5(degreesF – 32)/9 Prompt th
weeeeeb [17]

Answer:

Written in Python

import math

degreesF = float(input("Enter a temperature in degrees Fahrenheit: "))

degreesC = round(5 * (degreesF - 32)/9,1)

print(degreesC)

Explanation:

The following header allows you to use Math.Round() method in Python

import math

The following prompts the user for temperature in degrees Fahrenheit

degreesF = float(input("Enter a temperature in degrees Fahrenheit: "))

The following calculates the degree Celsius equivalent and also round it up

degreesC = round(5 * (degreesF - 32)/9,1)

The following prints the degree Celsius equivalent

print(degreesC)

5 0
3 years ago
You are employed as a network administrator at Widget. The Widget network is TCP/IP based. You have been instructed to configure
wolverine [178]

DHCP operations fall into four phases: server discovery, IP lease offer, IP lease request, and IP lease acknowledgement. These stages are often abbreviated as DORA for discovery, offer, request, and acknowledgement.

Explanation:

  • DHCP provides reliable IP address configuration, while reducing network administration.
  • Discovery : The DHCP client broadcasts a DISCOVER message on the network subnet using the destination address or the specific subnet broadcast address.  A DHCP client may also request its last known IP address
  • Offer :When the server receives a DISCOVER message from a client, which is an IP address lease request, the DHCP server reserves an IP address for the client and makes a lease offer by sending a OFFER message to the client.
  • Request : In response to the DHCP offer, the client replies with a REQUEST message, broadcast to the server,[a] requesting the offered address.
  • Acknowledge : When the DHCP server receives the REQUEST message from the client, the configuration process enters its final phase. The acknowledgement phase involves sending a ACK packet to the client.
7 0
3 years ago
Other questions:
  • How many megabytes of data can a factory made audio cd hold?
    13·1 answer
  • The addElement operation for the linked implementation must determine the parent of the next node to be inserted. Why?
    5·1 answer
  • What is the relationship between ionic bonds and cleavage
    13·1 answer
  • If you delete a sent message on gmail does the person still get it
    14·1 answer
  • Which of the following storage devices allows access to information in a sequential mode?
    14·2 answers
  • The number of bits per pixel is called what
    7·1 answer
  • A sequence of one or more characters is called
    14·1 answer
  • Obtaining the data of a video file from a flash drive is an example of a(n) _________ operation.
    6·1 answer
  • You can fit more RAW files on a memory card than JPEG files. true or false
    10·1 answer
  • Which button in the Sort & Filter gallery of the Data tab would alphabetize from A to Z quickly?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!