Which of the following threats is prevented by using token-based authentication?

Posted by: Pdfprep Category: CISA Tags: , ,

Which of the following threats is prevented by using token-based authentication?
A . Password sniffing attack on the network
B . Session eavesdropping attack on the network
C . Man-in-the-middle attack on the client
D . Denial of service attack over the network

Answer: A

Leave a Reply

Your email address will not be published.