Which of the following is based off of the MD5 hash?

A. LANMAN
B. NTLM
C. NTLM2
D. SHA-1


C. NTLM2 is based off of the MD5 hash. NTLM uses the RC4 hash.

Computer Science & Information Technology

You might also like to view...

When a procedure finishes execution, __________.

a. control returns to the point where the procedure was called and continues with the next statement b. the application terminates unless the procedure contains a Return statement c. control transfers to the next procedure found in the code d. the application waits for the user to trigger the next event

Computer Science & Information Technology

A text box allows you to place text anywhere on a slide

Indicate whether the statement is true or false

Computer Science & Information Technology

The key combination to switch between windows is hold down Alt key and press ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

A ____ is a unique combination of letters or numbers that identifies a specific user to Windows.

A. user name B. password C. keyboard shortcut D. sign-in screen

Computer Science & Information Technology