The __________ is unsuitable for a connectionless type of application because it requires the overhead of a handshake before any connectionless transmission, effectively negating the chief characteristic of a connectionless transaction.

A. timestamp approach
B. challenge-response approach
C. simple replay approach
D. one-way authentication approach

B. challenge-response approach

Computer Science & Information Technology

You might also like to view...

A(n) _____ analyzer is used to find information about the cell phone network and possible wireless networks

Fill in the blank(s) with correct word

Computer Science & Information Technology

The sysprep tool removes unique identifiers before making an image of a computer

Indicate whether the statement is true or false

Computer Science & Information Technology