Multiple Choice
With a _________ protocol, the user authenticates himself or herself to the token and then the token authenticates the user to the computer.
A) challenge
B) response
C) static
D) dynamic password generator
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q25: _ define the type and contents of
Q26: Once a worm is resident on a
Q27: Anomaly approaches attempt to define proper behavior.
Q28: Passwords serve to authenticate the ID of
Q29: A user only needs a password in
Q31: DAC is a concept that evolved out
Q32: _ aim to prevent or detect buffer
Q33: Rootkits are easy to detect and neutralize.
Q34: The primary purpose of a(n) _ is
Q35: The two types of audit records that