What authentication method encrypts both authentication information and data, in addition to being able to prompt a user to change an expired password?

A. Extensible Authentication Protocol (EAP)
B. Microsoft Encrypted Authentication Version 2 (MS-CHAP v2)
C. Encrypted Authentication (CHAP)
D. IPSec


Answer: B

Computer Science & Information Technology

You might also like to view...

Which command compiles the Java source code file Welcome.java?

a. cd Welcome.java b. javac Welcome.java c. java Welcome.java d. compile Welcome.java

Computer Science & Information Technology

The ____ attribute of a hotspot specifies a descriptive name for the image map.

A. Name B. Target C. Alt D. Map

Computer Science & Information Technology

Discuss how a VPN might be used and how it protects data.

What will be an ideal response?

Computer Science & Information Technology

Critical Thinking QuestionsCase 9-1You are presenting a two-hour seminar on using Excel features to professionals at an annual convention of accounting managers. The seminar will be followed by a brief Q&A session. Half-way through the seminar, you give the seminar participants a break. During the following Q&A session, another participant asked about using Excel to help in solving complex problems. You tell him to ____. a. use another program because Excel cannot solve complex problemsc. use Solver because it will evaluate multiple combinations of values for changing variables to find an optimal solution to a complex problemb. create multiple worksheets, one for each type of problemd. evaluate the need for the data

What will be an ideal response?

Computer Science & Information Technology