Which of the following authentication models uses a time stamp to prevent the risks associated with a replay attack?

Which of the following authentication models uses a time stamp to prevent the risks associated with a replay attack?

Which of the following authentication models uses a time stamp to prevent the risks associated with a replay attack?

A.
Two-factor authentication

B.
RADIUS

C.
LDAP

D.
Kerberos



Leave a Reply 0

Your email address will not be published. Required fields are marked *