The __________ is unsuitable for a connectionless type of application because it requires the overhead of a handshake before any connectionless transmission effectively negating the chief characteristic of a connectionless transaction.
A) timestamp approach
B) challenge-response approach
C) simple replay approach
D) one-way authentication approach
Correct Answer:
Verified
Q23: _ is an extension of identity management
Q25: _ in Greek mythology is a three
Q26: The first published report on Kerberos listed
Q27: _ protocols enable communicating parties to satisfy
Q28: Presenting an identifier to the security system
Q29: Examples of something the individual possesses would
Q31: An authentication process consists of two steps:
Q33: A _ attack is where an opponent
Q34: Presenting or generating authentication information that corroborates
Q40: Kerberos relies exclusively on _ .
A)symmetric encryption
B)asymmetric
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents