a. What characteristic of the true party is used in access card authentication, iris authentication, and digital

Question:

a. What characteristic of the true party is used in access card authentication, iris authentication, and digital certificate authentication?


b. Which form of authentication that we looked at depends on the supplicant proving that it knows something that only the true party should know?

23b.) Which form of authentication depends on the supplicant proving that she/he/it knows something that only the true party should know?

a. Reusable password authentication

b. Iris scanning

c. Both A and B

d. Neither A nor B


c. What if this information is learned by an attacker?

23c.) Digital certificate authentication fails if the supplicant _______.

a. Is the true party

b. Learns the true party’s private key

c. Learns the true party’s public key

d. Either B or C


d. Why is two-factor authentication desirable?

23d.) A debit card is secure because it requires two credentials for authentication—the card itself and a PIN. This is called _______.

a. Segmentation

b. Redundancy

c. Two-factor authentication

d. None of the above

Fantastic news! We've Found the answer you've been seeking!

Step by Step Answer:

Related Book For  book-img-for-question

Business Data Networks and Security

ISBN: 978-0134817125

11th Edition

Authors: Raymond R. Panko, Julia L. Panko

Question Posted: