Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GSNA Topic 5 Question 70 Discussion

Actual exam question for GIAC's GSNA exam
Question #: 70
Topic #: 5
[All GSNA Questions]

You work as a Network Administrator for Net Perfect Inc. The company has a Windows-based network. You have been assigned the task to

design the authentication system for the remote users of the company. For security purposes, you want to issue security tokens to the

remote users. The token should work on the one-time password principle and so once used, the next password gets generated. Which of the

following security tokens should you issue to accomplish the task?

Show Suggested Answer Hide Answer
Suggested Answer: B

An event-based token, by its nature, has a long life span. They work on the one-time password principle and so once used, the next

password is generated. Often the user has a button to press to receive this new code via either a token or via an SMS message. All

CRYPTOCard's tokens are event-based rather than time-based.

Answer C is incorrect. Bluetooth tokens are often combined with a USB token, and hence work in both a connected and a disconnected

state. Bluetooth authentication works when closer than 32 feet (10 meters). If the Bluetooth is not available, the token must be inserted into

a USB input device to function.

Answer A is incorrect. Virtual tokens are a new concept in multi-factor authentication first introduced in 2005 by security company

Sestus. Virtual tokens work by sharing the token generation process between the Internet website and the user's computer and have the

advantage of not requiring the distribution of additional hardware or software. In addition, since the user's device is communicating directly

with the authenticating website, the solution is resistant to man-in-the-middle attacks and similar forms of online fraud.

Answer D is incorrect. Single sign-on software tokens are used by the multiple, related, but independent software systems. Some

types of single sign-on (SSO) solutions, like enterprise single sign-on, use this token to store software that allows for seamless authentication

and password filling. As the passwords are stored on the token, users need not remember their passwords and therefore can select more

secure passwords, or have more secure passwords assigned.


Contribute your Thoughts:

Izetta
6 days ago
Hah, can you imagine if they went with Bluetooth tokens? The IT team would be chasing down lost tokens all day!
upvoted 0 times
...
Doyle
6 days ago
I prefer single sign-on software tokens as they provide convenience along with security.
upvoted 0 times
...
Chaya
10 days ago
I believe event-based tokens could also work well for generating unique passwords.
upvoted 0 times
...
Jaclyn
13 days ago
Single sign-on software tokens could be a good choice. Saves the users from having to remember a ton of passwords.
upvoted 0 times
...
Selma
14 days ago
Hmm, I'm not sure about Bluetooth tokens. Seems like they could be a bit of a hassle for remote users.
upvoted 0 times
...
Jutta
17 days ago
I think Virtual tokens would be the best option here. They're easy to use and integrate with Windows.
upvoted 0 times
Rex
5 days ago
User 2: Event-based tokens could also be a good option for added security measures.
upvoted 0 times
...
Kelvin
8 days ago
User 1: I agree, Virtual tokens are convenient and secure for remote users.
upvoted 0 times
...
...
Felix
1 months ago
I agree with Bea, virtual tokens would be the best option for one-time passwords.
upvoted 0 times
...
Bea
1 months ago
I think we should issue virtual tokens for security.
upvoted 0 times
...
Edna
2 months ago
Event-based tokens seem like the way to go. That one-time password thing is really secure.
upvoted 0 times
Sage
1 months ago
C) Bluetooth tokens
upvoted 0 times
...
Carole
1 months ago
B) Event-based tokens
upvoted 0 times
...
Chauncey
1 months ago
A) Virtual tokens
upvoted 0 times
...
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77