To counter threats to remote user authentication, systems generally rely on some form of ___________ protocol.

A. eavesdropping B. Trojan horse

C. challenge-response D. denial-of-service

C. challenge-response

Computer Science & Information Technology

You might also like to view...

Is there a way to search for any capital letter, followed by any number of digits?

What will be an ideal response?

Computer Science & Information Technology

The ________ function converts an integer to a string and returns the string value.

A) string stoint(int i) B) string strtoint(int i) C) string strint(int i) D) string to_string(int i) E) None of the above

Computer Science & Information Technology