Overview

challenge response


Show Summary Details

Quick Reference

A security technique by which the user of a network is asked a question to which the computer knows the answer, such as the maiden name of the user's mother. If the user gives the wrong response then he or she is regarded as an intruder. The questions and corresponding responses are stored when the user first registers with the network.

Subjects: Computing.


Reference entries

Users without a subscription are not able to see the full content. Please, subscribe or login to access all content.