Multiple Choice
The __________ is unsuitable for a connectionless type of application because it requires the overhead of a handshake before any connectionless transmission effectively negating the chief characteristic of a connectionless transaction.
A) timestamp approach
B) challenge-response approach
C) simple replay approach
D) one-way authentication approach
Correct Answer:

Verified
Correct Answer:
Verified
Q1: Any timestamp based procedure must allow for
Q4: Identity providers may also assign attributes to
Q5: Because there are no potential delays in
Q6: The _ is responsible for generating keys
Q8: A concept dealing with the use of
Q9: A solution,which eliminates the burden of each
Q10: Examples of something the individual possesses would
Q11: For network based user authentication the most
Q40: Identity federation is in essence an extension
Q42: _ protocols enable communicating parties to satisfy