Which of the following choices describe a Challenge-response tokens generation?
Challenge-response tokens are:
- A workstation or system generates a random challenge string and the owner enters the string into the token along with the proper PIN.
- The token generates a response that is then entered into the workstation or system.
- The authentication mechanism in the workstation or system then determines if the owner should be authenticated.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Page 37.
Also: HARRIS, Shon, All-In-One CISSP Certification Exam Guide, McGraw-Hill/Osborne, 2002, chapter 4: Access Control (pages 136-137).
Ressie
1 month agoTegan
2 months agoKimbery
2 months agoLaurel
2 months agoJosefa
2 months agoYen
3 months agoEttie
3 months agoLourdes
4 months agoJosphine
4 months agoCarmela
4 months agoLennie
4 months agoTerina
4 months agoMadelyn
4 months agoBrock
5 months agoClarinda
5 months agoSabrina
5 months agoTeddy
2 months agoAngella
2 months agoSylvie
3 months agoJulio
3 months agoElinore
6 months agoTeddy
6 months ago