New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GSNA Exam - Topic 2 Question 30 Discussion

Actual exam question for GIAC's GSNA exam
Question #: 30
Topic #: 2
[All GSNA Questions]

Which of the following types of authentication tokens forms a logical connection to the client computer but does not require a physical connection?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contactless tokens are the third main type of physical tokens. Unlike connected tokens, they form a logical connection to the client computer

but do not require a physical connection. The absence of the need for physical contact makes them more convenient than both connected and

disconnected tokens. As a result, contactless tokens are a popular choice for keyless entry systems and electronic payment solutions such as

Mobil Speedpass, which uses RFID to transmit authentication information from a keychain token. However, there have been various security

concerns raised about RFID tokens after researchers at Johns Hopkins University and RSA Laboratories discovered that RFID tags could be

easily cracked and cloned. Another downside is that contactless tokens have relatively short battery lives, usually only 3-5 years, which is low

compared to USB tokens which may last up to 10 years. However, some tokens do allow the batteries to be changed, thus reducing costs.

Answer A is incorrect. Virtual tokens are a new concept in multi-factor authentication first introduced in 2005 by security company

Sestus. Virtual tokens work by sharing the token generation process between the Internet website and the user's computer and have the

advantage of not requiring the distribution of additional hardware or software. In addition, since the user's device is communicating directly

with the authenticating website, the solution is resistant to man-in-the-middle attacks and similar forms of online fraud.

Answer B is incorrect. Connected tokens are tokens that must be physically connected to the client computer. Tokens in this category

will automatically transmit the authentication information to the client computer once a physical connection is made, eliminating the need for

the user to manually enter the authentication information. However, in order to use a connected token, the appropriate input device must be

installed. The most common types of physical tokens are smart cards and USB tokens, which require a smart card reader and a USB port,

respectively.

Answer C is incorrect. Disconnected tokens have neither a physical nor logical connection to the client computer. They typically do not

require a special input device, and instead use a built-in screen to display the generated authentication data, which the user enters manually

via a keyboard or keypad. Disconnected tokens are the most common type of security token used (usually in combination with a password) in

two-factor authentication for online identification.


Contribute your Thoughts:

0/2000 characters
Derrick
4 months ago
I agree with A, but I wouldn't underestimate D either!
upvoted 0 times
...
Tiffiny
4 months ago
Wait, are we sure about A? Seems too easy.
upvoted 0 times
...
Thersa
4 months ago
A makes sense, no physical connection needed!
upvoted 0 times
...
Tawanna
4 months ago
I thought it was B, connected tokens are pretty common.
upvoted 0 times
...
Rosenda
5 months ago
Definitely A, virtual tokens are the way to go!
upvoted 0 times
...
Jesusita
5 months ago
I’m confused between A and D. I feel like both could be correct, but I need to remember the specifics about how they connect.
upvoted 0 times
...
Von
5 months ago
I practiced a question similar to this, and I think it was about how virtual tokens work. So, I’m leaning towards A as well.
upvoted 0 times
...
Janae
5 months ago
I'm not entirely sure, but I remember something about contactless tokens being used in mobile payments. Could that be D?
upvoted 0 times
...
Annamae
5 months ago
I think the answer might be A, Virtual token, since it sounds like it fits the description of not needing a physical connection.
upvoted 0 times
...
Vannessa
5 months ago
Hmm, I'm not sure about this one. I know mobile testing is important, but I'm not clear on the specific types of testing we should provide. I'll have to think this through carefully.
upvoted 0 times
...
Carman
5 months ago
The ability to accept changes at no additional cost is a big advantage of Scrum, in my opinion. Customers really value that agility and responsiveness. I feel confident that's the best answer here.
upvoted 0 times
...
Vanda
5 months ago
Hmm, this is a tricky one. I'm not entirely sure about the relationship between the Allow Overlap Sending and Require Client Matter Code settings. I'll need to think this through carefully.
upvoted 0 times
...
Micah
5 months ago
Okay, I've got this. The centralized component is the virtual infrastructure manager (VIM), and the shared component for live migration is the cloud storage device. Option C is the answer.
upvoted 0 times
...

Save Cancel