Answer:
A portable device used for authenticating a user. Authentication tokens operate by challenge/response, time-based code sequences, or other techniques. This may include paper-based lists of one-time passwords.
Previous Question | Next Question |
What is Tunneling Router? | Explain the difference between gateway and firewall? |