1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetach [21]
3 years ago
13

Which of the following is a challenge-response authentication protocol intended to provide security at every level (sign-in, acc

ess, etc.) of a Windows network, but has since been identified as vulnerable to brute force and pass the hash attacks?
Computers and Technology
2 answers:
Mashutka [201]3 years ago
5 0

Answer:

New Technology LAN Manager (NTLM)

Explanation:

Windows New Technology LAN Manager (NTLM) is an outmoded challenge-response authentication protocol from Microsoft. Still in use though succeeded by Kerberos, NTLM is a form of Single Sign-On (SSO) enabling users to authenticate to applications without submitting the underlying password.

NT LAN Manager was the default protocol for Windows until Microsoft deprecated it, citing vulnerabilities related to the password hash’s password equivalency. Passwords stored on the server, or domain controller, are not salted and therefore an adversary with a password hash does not require the underlying password to authenticate. NTLM’s cryptography also predates newer <em>algorithms</em> such as <em>AES or SHA-256</em> and is susceptible to brute force attacks by today’s hardware.

umka2103 [35]3 years ago
3 0

Answer:

New technology LAN manager (NTLM).

Explanation:

A network is a medium of communication between Computer devices and allows for data resource sharing like printing services of a printer, web server etc.

A network security policy is a mechanism or a technical control of network access by users. Is configured in both the network and the computer system in the network.

The new technology LAN manager is a Microsoft protocol suite that provides a system level security to a network. This windows operating system protocol is intended to secure sign-in and access of user account, to assure the integrity, confidentiality and availability of the account.

It uses a fixed length of password for authenticating users, which is vulnerable to brute force attack.

You might be interested in
Hordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks are known as:
icang [17]
~Hello there! ^_^

Your answer: Hordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks are known as..?

Your answer: Hordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks are known as botnets.

Hope this helps~





3 0
4 years ago
Poshmark is more than a shopping app; it connects people and brings them together. Poshmark is a passionate group of people that
babymother [125]

Poshmark is more than a shopping app. It is known to be a shopping applicationthat links a person to other people whose style one likes.

<h3>What is the aim of Poshmark?</h3>

Poshmark is known to be a shopping app that links a person to other people whose style one likes adore.

It is known to help one to easily shop for any of their closets and boutiques needs. They are known to have about 80 million community members in all of the U.S., Canada, and Australia.

learn more about Poshmark from

brainly.com/question/26258231

8 0
2 years ago
Write a C++ program that takes a single character and prints the corresponding digit on the old-style dial or touchtone telephon
I am Lyosha [343]
Ok thanks Ianswer: c++
3 0
3 years ago
(1) Prompt the user to enter five numbers, being five people's weights. Store the numbers in an array of doubles. Output the arr
Mashutka [201]

Answer:

weights = []

total = 0

max = 0

for i in range(5):

   weight = float(input("Enter weight " + str(i+1) + ": "))

   weights.append(weight)

   total += weights[i]

   if weights[i] > max:

       max = weights[i]

average = total / 5

print("Your entered: " + str(weights))

print("Total weight: " + str(total))

print("Average weight: " + str(average))

print("Max weight: " + str(max))

Explanation:

Initialize the variables

Create a for loop that iterates 5 times

Get the values from the user

Put them inside the array

Calculate the total by adding each value to the total

Calculate the max value by comparing each value

When the loop is done, find the average - divide the total by 5

Print the results

6 0
3 years ago
Write a C function which takes three parameters which are the cost for an item in a grocery store, the quantity to buy, and the
xeze [42]

Answer:

struct item

{

  float previousCost;

  float taxAmount;

  float updatedCost;

} itemObject;

void calculation(int cost,int quantity,float tax)

  {

      struct item *itemPointer=&itemObject;

      itemPointer->previousCost=(cost) * (quantity);

      itemPointer->taxAmount=itemPointer->previousCost * (tax/100);

      itemPointer->updatedCost=itemPointer->previousCost+itemPointer->taxAmount;

  }

Explanation:

  • Define a structure called item that has 3 properties namely previousCost, taxAmount and updatedCost.
  • The calculation function takes in 3 parameters and inside the calculation function, make a pointer object of the item structure.
  • Calculate the previous cost by multiplying cost with quantity.
  • Calculate the tax amount by multiplying previous cost with (tax / 100).
  • Calculate the previous cost by adding previous cost with tax amount.
4 0
3 years ago
Read 2 more answers
Other questions:
  • Using the flowchart below, what value when entered for Y will generate a mathematical error and prevent our flowchart from being
    14·1 answer
  • When employees are hired, they agree to only use cell phones during breaks. How would you classify this?
    8·2 answers
  • file Assume that a prototype of the part above was built from several cubes. The total volume of the part is 0.54675 in.3. What
    6·1 answer
  • Which two keys on the keyboard allow an access user to move the insertion point to the next field to the right in datasheet view
    11·1 answer
  • To what are multiple servers arranged in racks related
    14·2 answers
  • Of the measures of feasibility in the accompanying figure, ____ considers points such as "Does the proposed platform have suffic
    8·1 answer
  • Assignment 3: chabot<br>​
    13·1 answer
  • Your older brother Max tells you about his secret plan to hack into his college’s computer network and change all of his grades.
    12·1 answer
  • How does a Cloud-first strategy approach a client's migration to the Cloud?by removing outside ecosystem partners from the Cloud
    14·1 answer
  • ___________ is some danger that can exploit a vulnerability.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!