Multiple Choice
To counter threats to remote user authentication, systems generally rely on some form of ___________ protocol.
A) eavesdropping
B) Trojan horse
C) challenge-response
D) denial-of-service
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q18: A _ authentication system attempts to authenticate
Q25: The most common means of human-to-human identification
Q26: Depending on the application, user authentication on
Q27: With the _ policy a user is
Q28: A _ attack attempts to disable a
Q31: An individual's signature is not unique enough
Q32: A good technique for choosing a password
Q33: _, in the context of passwords, refers
Q34: The _ is the pattern formed by
Q35: Presenting or generating authentication information that corroborates