Ask Question
21 April, 19:20

Which of the following is a challenge-response authentication protocol intended to provide security at every level (sign-in, access, etc.) of a Windows network, but has since been identified as vulnerable to brute force and pass the hash attacks?

+5
Answers (2)
  1. 21 April, 22:02
    0
    New Technology LAN Manager (NTLM)

    Explanation:

    Windows New Technology LAN Manager (NTLM) is an outmoded challenge-response authentication protocol from Microsoft. Still in use though succeeded by Kerberos, NTLM is a form of Single Sign-On (SSO) enabling users to authenticate to applications without submitting the underlying password.

    NT LAN Manager was the default protocol for Windows until Microsoft deprecated it, citing vulnerabilities related to the password hash's password equivalency. Passwords stored on the server, or domain controller, are not salted and therefore an adversary with a password hash does not require the underlying password to authenticate. NTLM's cryptography also predates newer algorithms such as AES or SHA-256 and is susceptible to brute force attacks by today's hardware.
  2. 21 April, 22:30
    0
    New technology LAN manager (NTLM).

    Explanation:

    A network is a medium of communication between Computer devices and allows for data resource sharing like printing services of a printer, web server etc.

    A network security policy is a mechanism or a technical control of network access by users. Is configured in both the network and the computer system in the network.

    The new technology LAN manager is a Microsoft protocol suite that provides a system level security to a network. This windows operating system protocol is intended to secure sign-in and access of user account, to assure the integrity, confidentiality and availability of the account.

    It uses a fixed length of password for authenticating users, which is vulnerable to brute force attack.
Know the Answer?
Not Sure About the Answer?
Find an answer to your question ✅ “Which of the following is a challenge-response authentication protocol intended to provide security at every level (sign-in, access, etc.) ...” in 📘 Computers and Technology if you're in doubt about the correctness of the answers or there's no answer, then try to use the smart search and find answers to the similar questions.
Search for Other Answers