The __________ is unsuitable for a connectionless type of application because it requires the overhead of a handshake before any connectionless transmission, effectively negating the chief characteristic of a connectionless transaction.
A. timestamp approach
B. challenge-response approach
C. simple replay approach
D. one-way authentication approach
B. challenge-response approach
Computer Science & Information Technology
You might also like to view...
A(n) _____ analyzer is used to find information about the cell phone network and possible wireless networks
Fill in the blank(s) with correct word
Computer Science & Information Technology
The sysprep tool removes unique identifiers before making an image of a computer
Indicate whether the statement is true or false
Computer Science & Information Technology