Which of the following authentication models uses a time stamp to prevent the risks associated with a replay attack?
A.
Two-factor authentication
B.
RADIUS
C.
LDAP
D.
Kerberos
Which of the following authentication models uses a time stamp to prevent the risks associated with a replay attack?
Which of the following authentication models uses a time stamp to prevent the risks associated with a replay attack?
A.
Two-factor authentication
B.
RADIUS
C.
LDAP
D.
Kerberos