Which authentication method is not susceptible to dictionary and brute force attacks?

A. CHAP
B. MS-CHAPv1
C. MS-CHAPv2
D. EAP-TLS


D
Explanation: EAP-TLS is immune to password-based attacks as it does not use passwords.

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. In current gaming software it is rare for data files to be needed. 2. The data saved in a file will remain there after the program ends but will be erased when the computer is turned off. 3. In a text file all data is stored as a series of characters. 4. All types of files can be viewed correctly in a simple text editor.

Computer Science & Information Technology

Show instructors (along with their course numbers and section numbers) teaching class sections with students whose last name begins with ‘M’. (16 rows)

What will be an ideal response?

Computer Science & Information Technology

Explain the difference between an inner join and outer join. Why is it important to understand joins when trying to retrieve data for decision making?

What will be an ideal response?

Computer Science & Information Technology

Changes made in a detail worksheet will automatically recalculate and display on this sheet

A) Final B) Summary C) Outline

Computer Science & Information Technology