PrepAway - Latest Free Exam Questions & Answers

Which of the following forms of authentication would most likely apply a digital signature algorithm to every

Which of the following forms of authentication would most likely apply a digital signature algorithm
to every bit of data that is sent from the claimant to the verifier?

PrepAway - Latest Free Exam Questions & Answers

A.
Dynamic authentication

B.
Continuous authentication

C.
Encrypted authentication

D.
Robust authentication

Explanation:
See also www.rxn.com/services/faq/internet/ISPTG-5.html
Continuous Authentication This type of authentication provides protection against impostors who
can see, alter, and insert information passed between the claimant and verifier even after the
claimant/verifier authentication is complete. These are typically referred to as active attacks, since
they assume that the imposter can actively influence the connection between claimant and verifier.
One way to provide this form of authentication is to apply a digital signature algorithm to every bit
of data that is sent from the claimant to the verifier.


Leave a Reply