Multiple Choice
The __________ approach is unsuitable for a connectionless type of application because it requires the overhead of a handshake before any connectionless transmission,effectively negating the chief characteristic of a connectionless transaction.
A) timestamp
B) backward reply
C) challenge-response
D) replay
Correct Answer:

Verified
Correct Answer:
Verified
Q12: Examples of dynamic biometrics include recognition by
Q27: In an unprotected network environment any client
Q28: _ is an authentication service developed as
Q29: Intended to provide an integrity check as
Q30: Kerberos provides a trusted third party authentication
Q31: User authentication is the basis for most
Q33: Presenting an identifier to the security system
Q34: The first published report on Kerberos listed
Q35: The security of the Kerberos server should
Q36: There are four general means of authenticating