answersLogoWhite

0


Best Answer

http://technet.microsoft.com/en-us/library/bb727067.aspx

User Avatar

Wiki User

14y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is the primary authentication protocol used in active directory domain environments?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What is the primary weakness in the icmp protocol that makes it subject to attack?

the primary weakness in the ICMP protocol is that, it does provide authentication to verify the destination address.


What are the primary functions of active directory?

To provide authentication and authorization services for hardware and software resources on the network like computer,users,printers groups etc. Authentication would be verifying the user's identity while authorization is the process of granting the user access to only the resources they are permitted to useTo provide authentication and authorization services for hardware and software resources on the network. Authentication would be verifying the user's identity while authorization is the process of granting the user access to only the resources they are permitted to use.


What are several of the largest advantages of using active directory integrated zones as a type for a larger organization?

The main zone types used in Windows Server 2003 DNS environments are primary zones and Active Directory-integrated zones. Both primary zones and secondary zones are standard DNS zones that use zone files. The main difference between primary zones and secondary zones is that primary zones can be updated. Secondary zones contain read-only copies of zone data.An Active Directory-integrated zone can be defined as an improved version of a primary DNS zone because it can use multi-master replication and the security features of Active Directory. The zone data of Active Directory-integrated zones are stored in Active Directory.Active Directory-integrated zones are authoritative primary zones.A few advantages that Active Directory-integrated zone implementations have over standard primary zone implementations are:Active Directory replication is faster, which means that the time needed to transfer zone data between zones is far less.The Active Directory replication topology is used for Active Directory replication, and for Active Directory-integrated zone replication. There is no longer a need for DNS replication when DNS and Active Directory are integrated.Active Directory-integrated zones can enjoy the security features of Active Directory.The need to manage your Active Directory domains and DNS namespaces as separate entities is eliminated. This in turn reduces administrative overhead.When DNS and Active Directory are integrated; the Active Directory-integrated zones are replicated, and stored on any new domain controllers automatically. Synchronization takes place automatically when new domain controllers are deployed


What is the primary protocol used for Name Resolution?

dns


What are typical access rights that may be performed on a directory?

A directory can be created or deleted, can be modified by adding/changing/removing contents, permissions can be changed, as well as primary ownership and primary group membership. In short, most operations you can do on a file can also be done on a directory. Additional things for a directory are that they can be searched.


What are the two primary functions of internet protocol?

Addressing and multiplexing


What is the primary markup language and protocol of the web?

HyperText Markup Language, also called HTML is the language. The protocol is HyperText Transfer Protocol, also called HTTP.


What is the primary protocol used by window to communicate over a network?

Tcp/ip


What are protocol numbers for HTTP and HTTPS?

Secure Socket Layer SSL is called the abbreviations, Chinese condom after Layer protocols Layer. Use this agreement, you of all the submitted data will first encrypted netease mail, then submit to, which can effectively prevent hackers steal your username, password and communication content, guarantee the safety of your personal content. SSL (Secure Socket Layer,) For the development, to safeguard Netscape in the security of data transmission, on the Internet, using data Encryption (Encryption) technology, which can ensure data on the network The transmission process on won't be intercepted and eavesdropping. At present the specification of generic for 40 bit of safety standards, the United States launched 128 bit myriads of higher security Standard, but limit exit. As long as 3.0 version above of I.E. or Netscape browser can support SSL. The current version for 3.0. It has been widely used in between Web browser and server the identity authentication and encryption data transmission. SSL protocol is located in the TCP/IP protocol and various application layer protocol for data communications between provide security support. SSL Protocol can be divided into two layers: SSL Record Protocol (SSL Protocol) : it establish Record in reliable transfer Protocol (such as TCP) above, for high-rise protocols that provide the data package, compression, encryption basic function such as support. SSL Protocol Handshake Handshake agreement (SSL) : it is based in SSL record above used in actual agreement before the start of the data transmission, telecommunications identity authentication, the parties hereto negotiate encryption algorithm, exchange encryption keys, etc. SSL protocols that provide service mainly include: 1) the authentication user and server to ensure data sent to the correct client and server; 2) encrypted data to prevent data midway is stolen; 3) maintain the integrity of the data to ensure data in a transmission process does not be changed. SSL protocol workflow: Server authentication stage: 1) the client to the server sends a start information "Hello" to begin a new session connection; 2) server according to customer's information to determine whether to need to generate new master key, if need be, in response to customer "server will contain information Hello" the information needed to generate main key; 3) the server respond customer according to receive information, produce a primary key, and after public key encryption of servers to the server. 4) server resume the main key, and back to the customer a with the main authentication information, this key authentication server let customers. User authentication stage: before that, the server has passed the authentication, this one phase customers for customers mainly completes authentication. After the authentication server to send a question to the customer, the customer return (digital) signed questions and their public keys to the server, which provide certification. From the service provided by SSL protocol and its workflow can see, SSL protocol operation is based on business to consumer information confidential promises, it goes against consumer to businesses. In e-commerce, because run primary stage of electronic commerce enterprise are mostly credibility higher big company, so this problem is still not fully exposed. But with the development of e-commerce, the small and medium-sized companies are also involved in electronic payment process, so that the single problem is more and more outstanding authentication. Although in SSL3.0 through digital signatures and digital certificate can realize the browser and the Web server both identity authentication, but SSL protocol still has some problems, for example, can only provide transactions between customers and server authentication, involving both sides of the many electronic transactions, SSL protocol and the safety of the parties can't coordinate between the transmission and trust relationship. In this case, Visa and MasterCard two big credit card male organization established SET agreement for on the net the credit card payment provides global standards. http://www.nicerosettastone.com/


What is the primary protocol suite responsible for message transmission on the Internet?

The Internet Protocol (IP) is a protocol used for communicating data across a packet-switched internetwork using the Internet Protocol Suite, also referred to as TCP/IP. IP is the primary protocol in the Internet Layer of the Internet Protocol Suite and has the task of delivering distinguished protocol datagrams (packets) from the source host to the destination host solely based on their addresses. For this purpose the Internet Protocol defines addressing methods and structures for datagram encapsulation. The first major version of addressing structure, now referred to as Internet Protocol Version 4 (IPv4) is still the dominant protocol of the Internet, although the successor, Internet Protocol Version 6 (IPv6) is being deployed actively worldwide.


1. What is the primary function of a file server on a network?

In which of the following environments would a MAN be most appropriate?


What is a real ip?

IP refers to Internet Protocol....:IP is the primary protocol in the Internet Layer of the Internet Protocol Suite. Along with TCP (Transmission Control Protocol), it provides end to end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination.There is no such thing like real IP.