1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetach [21]
4 years ago
13

Which of the following is a challenge-response authentication protocol intended to provide security at every level (sign-in, acc

ess, etc.) of a Windows network, but has since been identified as vulnerable to brute force and pass the hash attacks?
Computers and Technology
2 answers:
Mashutka [201]4 years ago
5 0

Answer:

New Technology LAN Manager (NTLM)

Explanation:

Windows New Technology LAN Manager (NTLM) is an outmoded challenge-response authentication protocol from Microsoft. Still in use though succeeded by Kerberos, NTLM is a form of Single Sign-On (SSO) enabling users to authenticate to applications without submitting the underlying password.

NT LAN Manager was the default protocol for Windows until Microsoft deprecated it, citing vulnerabilities related to the password hash’s password equivalency. Passwords stored on the server, or domain controller, are not salted and therefore an adversary with a password hash does not require the underlying password to authenticate. NTLM’s cryptography also predates newer <em>algorithms</em> such as <em>AES or SHA-256</em> and is susceptible to brute force attacks by today’s hardware.

umka2103 [35]4 years ago
3 0

Answer:

New technology LAN manager (NTLM).

Explanation:

A network is a medium of communication between Computer devices and allows for data resource sharing like printing services of a printer, web server etc.

A network security policy is a mechanism or a technical control of network access by users. Is configured in both the network and the computer system in the network.

The new technology LAN manager is a Microsoft protocol suite that provides a system level security to a network. This windows operating system protocol is intended to secure sign-in and access of user account, to assure the integrity, confidentiality and availability of the account.

It uses a fixed length of password for authenticating users, which is vulnerable to brute force attack.

You might be interested in
Discuss advantages and disadvantages of operating system
Serjik [45]

Answer and Explanation:

Advantages-

  1. Computing source- Through the operating system, users can communicate with computers to perform various functions such as arithmetic calculations and other significant tasks.
  2. Safeguard Of Data- There’s a lot of user data stored on the computer. Windows Defender in Microsoft Windows detects malicious and harmful files and removes them. Also, it secures your data by storing them with a bit to bit encryption.
  3. Resource Sharing- Operating systems allow the sharing of data and useful information with other users via Printers, Modems, Players, and Fax Machines. Besides, a single user can share the same data with multiple users at the corresponding time via mails. Also, various apps, images, and media files can be transferred from PC to other devices with the help of an operating system.

Disadvantages-

  1. Expensive- It is costly.
  2. System Failure- System failures may occur. If the central operating system fails, it will affect the whole system, and the computer will not work. If the central system crashes, the whole communication will be halted, and there will be no further processing of data.
  3. Virus Threats- Threats to the operating systems are higher as they are open to such virus attacks. Many users download malicious software packages on their system which halts the functioning of OS and slow it down.

4 0
3 years ago
Read 2 more answers
Which is an example of correct HTML? &lt;h1&gt; This is a heading&lt;/h1&gt;
denis23 [38]

Answer:

An HTML tag is a special word or letter surrounded by angle brackets, < and >. You use tags to create HTML elements , such as paragraphs or links.

Explanation:

Many elements have an opening tag and a closing tag — for example, a p (paragraph) element has a <p> tag, followed by the paragraph text, followed by a closing </p> tag. HTML Editors

Step 1: Open Notepad (PC) Windows 8 or later: ...

Step 1: Open TextEdit (Mac) Open Finder > Applications > TextEdit. ...

Step 2: Write Some HTML. Write or copy the following HTML code into Notepad: ...

Step 3: Save the HTML Page. Save the file on your computer. ...

Step 4: View the HTML Page in Your Browser. hope this helps you :) god loves you :)

4 0
3 years ago
Read 2 more answers
Universal Containers (UC) uses a custom object called Vendor. The Vendor custom object has a Master-Detail relationship with the
Rudik [331]

Answer:

The account record comprises of Invoice roll up summary fields.

Explanation:

The possible reason that this change was not permitted was that the account record comprises of Invoice roll up summary fields.

Invoice roll up summary fields: A roll-up summary field computes values from associated records, for example those in a linked list. a person or someone ca design a roll-up summary field to show a value in a master record by building  the values of fields in a particular record.

The detail record must be associated to the master through a master-detail relationship. for instance, you want to show the sum of invoice amounts for all linked custom object records in an account’s Invoices related list. you can show the whole or sum in a custom account field refereed to as Total Invoice Amount.

4 0
3 years ago
Snippet 1: check_file_permissions.c #include
vitfil [10]

Answer:

I don't know  you should figure that out good luck

Explanation:

good luck

3 0
3 years ago
What is the full form of ARPANet, WAN,FTP,DCP,HTML,ISP and last WWW​
Lapatulllka [165]

Advanced Research Projects Agency Network,

wide area network

File Transfer Protocol

?

Hypertext Markup Language

Internet service provider

world wide web

6 0
3 years ago
Read 2 more answers
Other questions:
  • When an instance of a class, or object, is specified as a parameter to a method, a reference to the said object is passed to the
    15·1 answer
  • A storyboard is an example of an implementation tool.<br><br> A.<br> True<br><br> B.<br> False
    8·2 answers
  • What are the two components that make up the chipset?
    15·1 answer
  • Which of the following indicates what a reply to all function does in most email programs
    8·1 answer
  • The creation of​ __________ with digital media allows for large quantities of numerical or textual data to be searched online by
    10·2 answers
  • I love python. it be a good programming language...........................................
    11·1 answer
  • Using the SUM function allows a series of numbers to be multiplied. subtracted. added. divided.
    13·1 answer
  • Which platform is dedicated to Customer Relationship Management (CRM)?
    7·1 answer
  • ......... defines the path of the movement for an object.
    12·1 answer
  • How do you<br>know which Finance system <br>is the right one for an<br>Institutions<br>​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!