What authentication protocol can perform authentication, but does not require it, so that operating systems without password encryption capabilities can still connect to RAS?

A. Challenge Handshake Authentication Protocol
B. Extensible Authentication Protocol
C. Microsoft Challenge Handshake Authentication Protocol v2
D. Password Authentication Protocol


Answer: D

Computer Science & Information Technology

You might also like to view...

Is an array sorted in nondecreasing order always a minheap? Can the opposite be said—that the elements of a minheap are always sorted in nondecreasing order? Explain.

What will be an ideal response?

Computer Science & Information Technology

What is the best case for a pattern P and string T in string matching?

a. O(n) b. O(log n) c. O(m log n) d. O(n^2)

Computer Science & Information Technology

The Find button is found in the Find group under the ________ tab

A) External Data B) Home C) Database Tools D) Create

Computer Science & Information Technology

If a ping from host A to IP address 172.16.1.52 for router R1 in the same subnet succeeds, which of the following can be concluded?

A) R1 is successfully configured. B) Host A is successfully configured. C) Host A and 172.16.1.52 completed the ARP process. D) The host 172.16.1.52 can send ICMP Echo Reply messages.

Computer Science & Information Technology