Multiple Choice
To counter threats to remote user authentication,systems generally rely on some form of ___________ protocol.
A) eavesdropping
B) challenge-response
C) Trojan horse
D) denial-of-service
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q1: The technique for developing an effective and
Q2: User authentication is the fundamental building block
Q10: Identifiers should be assigned carefully because authenticatedidentities
Q13: Enrollment creates an association between a user
Q18: Each individual who is to be included
Q18: User authentication is a procedure that allows
Q19: Memory cards store and process data.
Q28: A _ attack attempts to disable a
Q38: In a biometric scheme some physical characteristic
Q39: Depending on the details of the overall