NetNTLM responses are used in which authentication protocol?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

NetNTLM responses are used in which authentication protocol?

Explanation:
NetNTLM responses belong to the NTLM authentication protocol, which uses a challenge–response exchange to prove knowledge of the user’s password without sending it directly. In this flow, the server issues a random challenge, and the client replies with a NetNTLM response computed from the user’s password hash. The server then validates that response to authenticate the user. Kerberos relies on tickets rather than NetNTLM responses, while OAuth and SAML are token-based web authentication methods that operate differently. So NetNTLM responses are specifically used in the NTLM protocol.

NetNTLM responses belong to the NTLM authentication protocol, which uses a challenge–response exchange to prove knowledge of the user’s password without sending it directly. In this flow, the server issues a random challenge, and the client replies with a NetNTLM response computed from the user’s password hash. The server then validates that response to authenticate the user. Kerberos relies on tickets rather than NetNTLM responses, while OAuth and SAML are token-based web authentication methods that operate differently. So NetNTLM responses are specifically used in the NTLM protocol.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy