a. What characteristic of the true party is used in access card authentication, iris authentication, and digital
Question:
a. What characteristic of the true party is used in access card authentication, iris authentication, and digital certificate authentication?
b. Which form of authentication that we looked at depends on the supplicant proving that it knows something that only the true party should know?
23b.) Which form of authentication depends on the supplicant proving that she/he/it knows something that only the true party should know?
a. Reusable password authentication
b. Iris scanning
c. Both A and B
d. Neither A nor B
c. What if this information is learned by an attacker?
23c.) Digital certificate authentication fails if the supplicant _______.
a. Is the true party
b. Learns the true party’s private key
c. Learns the true party’s public key
d. Either B or C
d. Why is two-factor authentication desirable?
23d.) A debit card is secure because it requires two credentials for authentication—the card itself and a PIN. This is called _______.
a. Segmentation
b. Redundancy
c. Two-factor authentication
d. None of the above
Step by Step Answer:
Business Data Networks and Security
ISBN: 978-0134817125
11th Edition
Authors: Raymond R. Panko, Julia L. Panko