PrepAway - Latest Free Exam Questions & Answers

Authentication in which a random value is presented to a user, who then returns a calculated number based on t

Authentication in which a random value is presented to a user, who then returns a calculated
number based on that random value is called:

PrepAway - Latest Free Exam Questions & Answers

A.
Man-in-the-middle

B.
Personal identification number (PIN) protocol

C.
One-time password

D.
Challenge-response

Explanation:
In challenge-response authentication, the user enters a random value (challenge) sent by the
authentication server into a token device. The token device shares knowledge of a cryptographic
secret key with the authentication server and calculates a response based on the challenge value
and the secret key. This response is entered into the authentication server, which uses the response
to authenticate the identity of the user by performing the same calculation and comparing results.
Answer “man-in-the-middle” is a type of attack in which a cracker is interposed between the user
and authentication server and attempts to gain access to packets for replay in order to impersonate
a valid user. A “one-time password” is a password that is used only once to gain access to a network
or computer system. A typical implementation is through the use of a token that generates a
number based on the time of day. The user reads this number and enters it into the authenticating
device. The authenticating device calculates the same number based on the time of day and uses the
same algorithm used by the token. If the token’s number matches that of the authentication server,
the identity of the user is validated. Obviously, the token and the authentication server must be
time-synchronized for this approach to work. Also, there is allowance for small values of time skew
between the authorization device and the token. Answer d refers to a PIN number that is something
you know used with something you have, such as an ATM card.


Leave a Reply