Describe how challenge-response passwords work.

What will be an ideal response?


Each time the user logs in, the authenticating computer or firewall generates a new random number (the challenge) and sends it to the user, who enters a secret PIN or password (the response). If the challenge and PIN or password match the information stored on the authenticating server, the user gains access.

Computer Science & Information Technology

You might also like to view...

When you schedule a(n) ____, its description appears in a small banner below the day heading.

A. appointment B. event C. meeting D. item

Computer Science & Information Technology

Early networks were sometimes configured as ____________________ networks, in which computers communicate with and provide services to their "peers."

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A network administrator is troubleshooting an intermittent network issue between devices that have a particularly long cable run. The issue was escalated to a network designer who alluded to potential attenuation issues. Which of the following BEST describes what the network designer was referring to?

A. Bad connectors B. Cross-talk C. EMI / Interference D. dB loss

Computer Science & Information Technology

When no access modifier is specified for a method or variable, the method or variable:

a. Is public. b. Is private. c. Has package access. d. Is static.

Computer Science & Information Technology