What authentication method encrypts both authentication information and data, in addition to being able to prompt a user to change an expired password?
A. Extensible Authentication Protocol (EAP)
B. Microsoft Encrypted Authentication Version 2 (MS-CHAP v2)
C. Encrypted Authentication (CHAP)
D. IPSec
Answer: B
You might also like to view...
Which command compiles the Java source code file Welcome.java?
a. cd Welcome.java b. javac Welcome.java c. java Welcome.java d. compile Welcome.java
The ____ attribute of a hotspot specifies a descriptive name for the image map.
A. Name B. Target C. Alt D. Map
Discuss how a VPN might be used and how it protects data.
What will be an ideal response?
Critical Thinking QuestionsCase 9-1You are presenting a two-hour seminar on using Excel features to professionals at an annual convention of accounting managers. The seminar will be followed by a brief Q&A session. Half-way through the seminar, you give the seminar participants a break. During the following Q&A session, another participant asked about using Excel to help in solving complex problems. You tell him to ____. a. use another program because Excel cannot solve complex problemsc. use Solver because it will evaluate multiple combinations of values for changing variables to find an optimal solution to a complex problemb. create multiple worksheets, one for each type of problemd. evaluate the need for the data
What will be an ideal response?