nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #311

CERTIFIED-IN-CYBERSECURITY Question #311: Real Exam Question with Answer & Explanation

The correct answer is A: Synchronous. Synchronous token-based authentication generates codes at fixed intervals without a server challenge. For instance, a security token might be programmed to generate a new, valid code every 30 seconds. The server and the token stay synchronized so that the server knows what code t

Access Controls Concepts

Question

Which type of token-based authentication generates codes at fixed intervals without a server challenge? ()

Options

  • ASynchronous
  • BAsynchronous
  • CSmart card
  • DRFID

Explanation

Synchronous token-based authentication generates codes at fixed intervals without a server challenge. For instance, a security token might be programmed to generate a new, valid code every 30 seconds. The server and the token stay synchronized so that the server knows what code to expect and when. In contrast, Asynchronous does not generate codes at fixed intervals and instead requires a server challenge for each code. Smart cards, while a form of token-based authentication, typically require a PIN and do not generate codes at fixed intervals. RFID (Radio Frequency Identification) is a technology for identifying objects using radio waves, not a type of token-based authentication. Thus, these options are incorrect because they do not generate codes at fixed intervals without a server challenge.

Topics

#Authentication#Token-based authentication#One-Time Password (OTP)#Synchronous authentication

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions