Which of the following is a challenge-response authentication protocol intended to provide security at every level (sign-in, access, etc.) of a Windows network, but has since been identified as vulnerable to brute force and pass the hash attacks?
+1
Answers (2)
Know the Answer?
Not Sure About the Answer?
Get an answer to your question ✅ “Which of the following is a challenge-response authentication protocol intended to provide security at every level (sign-in, access, etc.) ...” in 📙 Computers & Technology if there is no answer or all answers are wrong, use a search bar and try to find the answer among similar questions.
Home » Computers & Technology » Which of the following is a challenge-response authentication protocol intended to provide security at every level (sign-in, access, etc.) of a Windows network, but has since been identified as vulnerable to brute force and pass the hash attacks?