In which form of authentication does the authenticating device generate a random code and send it to the user who wants to be authenticated?

A. basic
B. challenge/response
C. biometrics
D. signature


Answer: B

Computer Science & Information Technology

You might also like to view...

Explain how the for loop is executed. Does the increment step happen before or after the first pass of the loop?

What will be an ideal response?

Computer Science & Information Technology

You can use variables to store the values of processing items, which do not appear in a user interface.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

COGNITIVE ASSESSMENT What is the role of the W3C?

A. own and control the Internet B. oversee research and set standards for many areas of the Internet C. control the World Wide Web; monitor and govern the use of data and information communicated over the Internet D. supervise and approve corporate and commercial use of the World Wide Web

Computer Science & Information Technology

Can you think of other systems besides computers that may be said to have both an architecture and an organization?

What will be an ideal response?

Computer Science & Information Technology