adplus-dvertising
frame-decoration

Question

In Challenge-Response authentication the claimant ...............

a.

Proves that she knows the secret without revealing it

b.

Proves that she doesn’t know the secret

c.

Reveals the secret

d.

Gives a challenge

Answer: (a).Proves that she knows the secret without revealing it

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. In Challenge-Response authentication the claimant ...............

Similar Questions

Discover Related MCQs

Q. Decrypt the message “WTAAD” using the Caesar Cipher with key=15.

Q. To guarantee correction of upto t errors, the minimum Hamming distance dmin in a block code must be ................

Q. Which of the following devices takes data sent from one network device and forwards it to the destination node based on MAC address?

Q. .................. do not take their decisions on measurements or estimates of the current traffic and topology.

Q. The number of bits used for addressing in Gigabit Ethernet is ...................

Q. Which of the following layer of OSI Reference model is also called end-to-end layer?

Q. The IP address ................... is used by hosts when they are being booted.

Q. Suppose we want to download text documents at the rate of 100 pages per second. Assume that a page consists of an average of 24 lines with 80 characters in each line. What is the required bit rate of the channel?

Q. Quadrature Amplitude Modulation means changing both:

Q. If a file consisting of 50,000 characters takes 40 seconds to send, then the data rate is ........................

Q. Match the following:

List - I
(a) Data link layer
(b) Network layer
(c) Transport layer
(d) Presentation layer

List - II
(i) Encryption
(ii) Connection control
(iii) Routing
(iv) Framing

Code :
(a) (b) (c) (d)

Q. The address of a class B host is to be split into subnets with a 6 - bit subnet number. What is the maximum number of subnets and maximum number of hosts in each subnet?

Q. Which of the following statements are true?

(a) The fragmentation fields in the base header section of IPv4 have moved to the fragmentation extension header in IPv6.
(b) The authentication extension header is new in IPv6.
(c) The record route option is not implemented in IPv6.

Q. Which of the following routing technique / techniques is / are used in distributed systems?

(a) Fixed Routing
(b) Virtual Routing
(c) Dynamic Routing