Which authentication method does the following sequence: Logon request, encrypts value response, server, challenge, compare encrypts results, authorize or fail referred to?
Which of the following types of publicly accessible servers should have anonymous logins disabled to prevent an attacker from transferring malicious data?