What authentication protocol can perform authentication, but does not require it, so that operating systems without password encryption capabilities can still connect to RAS?
A. Challenge Handshake Authentication Protocol
B. Extensible Authentication Protocol
C. Microsoft Challenge Handshake Authentication Protocol v2
D. Password Authentication Protocol
Answer: D
Computer Science & Information Technology
You might also like to view...
Text or graphical representations of facial expressions that were created to illustrate the mood of the writer are called ________
A) SmartArt B) taglines C) emoticons D) clipart
Computer Science & Information Technology
Briefly list some components in a learning management system trainers would likely find useful as part of a training program.
What will be an ideal response?
Computer Science & Information Technology