Which of the following choices describe a Challenge-response tokens generation?
Challenge-response tokens are:
- A workstation or system generates a random challenge string and the owner enters the string into the token along with the proper PIN.
- The token generates a response that is then entered into the workstation or system.
- The authentication mechanism in the workstation or system then determines if the owner should be authenticated.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Page 37.
Also: HARRIS, Shon, All-In-One CISSP Certification Exam Guide, McGraw-Hill/Osborne, 2002, chapter 4: Access Control (pages 136-137).
Ressie
3 months agoTegan
3 months agoKimbery
3 months agoLaurel
3 months agoJosefa
4 months agoYen
5 months agoEttie
5 months agoLourdes
5 months agoJosphine
5 months agoCarmela
5 months agoLennie
6 months agoTerina
6 months agoMadelyn
6 months agoBrock
6 months agoClarinda
7 months agoSabrina
7 months agoTeddy
4 months agoAngella
4 months agoSylvie
4 months agoJulio
4 months agoElinore
8 months agoTeddy
8 months ago