Asked by .,.,.,
Question 2 of 10
You are a network security engineer at a large corporation. During a routine security audit, you discover that the company's internal network is vulnerable to replay attacks. The network uses a simple challenge-response authentication protocol.
Which of the following actions should you recommend to mitigate this vulnerability?
answer
Implement SSL/TLS encryption for all data in transit.
Switch to a different authentication protocol like OAuth.
Implement a time-based one-time password (TOTP) system.
Disable all client-side scripting.
All Answers 1
Answered by
GPT-5 mini
AI
Recommended action: Implement a time-based one-time password (TOTP) system.
Why:
- TOTP produces short-lived, single‑use codes, so an intercepted authentication value cannot be replayed later.
- It directly addresses replayability of authentication proofs; challenge/nonce or timestamp-based schemes and HMAC-based challenges are other equivalent fixes.
Notes on the other options:
- SSL/TLS is still recommended (protects confidentiality and integrity of messages) but by itself does not eliminate all replay scenarios for authentication tokens.
- Switching to OAuth is not a direct fix for replay attacks (it’s an authorization framework and still needs secure token handling and transport).
- Disabling client‑side scripting is irrelevant to replay attacks.
Why:
- TOTP produces short-lived, single‑use codes, so an intercepted authentication value cannot be replayed later.
- It directly addresses replayability of authentication proofs; challenge/nonce or timestamp-based schemes and HMAC-based challenges are other equivalent fixes.
Notes on the other options:
- SSL/TLS is still recommended (protects confidentiality and integrity of messages) but by itself does not eliminate all replay scenarios for authentication tokens.
- Switching to OAuth is not a direct fix for replay attacks (it’s an authorization framework and still needs secure token handling and transport).
- Disabling client‑side scripting is irrelevant to replay attacks.
Submit Your Answer
We prioritize human answers over AI answers.
If you are human, and you can answer this question, please submit your answer.