A security administrator wishes to implement a method of generating encryption keys from user passwords to enhance account security. Which of the following would accomplish this task?

A. NTLMv2
B. Blowfish
C. Diffie-Hellman
D. PBKDF2


Answer: C. Diffie-Hellman

Computer Science & Information Technology

You might also like to view...

In the accompanying figure, which number represents the workspace options?

A. 1 B. 2 C. 3 D. 4

Computer Science & Information Technology

A small box that displays the name of a screen element or information about it is called a ________

A) ScreenHint B) ScreenShot C) ScreenClue D) ScreenTip

Computer Science & Information Technology

The ____ lists the contents of a folder.

A. message list B. Navigation Pane C. Reading Pane D. message pane

Computer Science & Information Technology

What technology provides fault tolerance and improved performance in a connection between a client and a server providing an SMB share?

What will be an ideal response?

Computer Science & Information Technology