Your organization is planning to implement remote access capabilities. Management wants strong authentication and wants to ensure that passwords expire after a predefined time interval. Which of the following choices BEST meets this requirement?

A. HOTP

B. TOTP

C. CAC

D. Kerberos


B. A Time-based One-Time Password (TOTP) meets this requirement. Passwords created with TOTP expire after 30 seconds.

Computer Science & Information Technology

You might also like to view...

Given x = 3 and y = 1, what value will be assigned to the Double variable w when the following statement is executed? w = (x + y) / (x – y)

(A) 1 (B) 2 (C) 3 (D) None of the above

Computer Science & Information Technology

On the Task tab, in the ____ group, you can click the Details button to record and view specific information for invoicing a client.

A. Records B. Show C. View D. Statistics

Computer Science & Information Technology

Linux provides semaphores to help solve the problems of mutual exclusion and of producers and consumers. The Linux semaphore structure contains ____ fields.

A. two B. three C. four D. five

Computer Science & Information Technology

The OSI model tells us what kind of wire or what kind of connector to use to connect the pieces of a network.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology