What authentication protocol can perform authentication, but does not require it, so that operating systems without password encryption capabilities can still connect to RAS?

A. Challenge Handshake Authentication Protocol
B. Extensible Authentication Protocol
C. Microsoft Challenge Handshake Authentication Protocol v2
D. Password Authentication Protocol

Answer: D

Computer Science & Information Technology

You might also like to view...

Text or graphical representations of facial expressions that were created to illustrate the mood of the writer are called ________

A) SmartArt B) taglines C) emoticons D) clipart

Computer Science & Information Technology

Briefly list some components in a learning management system trainers would likely find useful as part of a training program.

What will be an ideal response?

Computer Science & Information Technology