Answer:
An authentication technique whereby a server sends an unpredictable challenge to the user, who computes a response using some form of authentication token.
Previous Question | Next Question |
What is Worm? | What is Access Control Lists? |
Previous Question | Next Question |
What is Worm? | What is Access Control Lists? |