Crucial Exams
  • CompTIA Study Materials
    • CompTIA A+ 220-1001
    • CompTIA A+ 220-1002
    • CompTIA A+ 220-901
    • CompTIA A+ 220-902
    • CompTIA Network+ N10-006
    • CompTIA Security+ SY0-401
    • CompTIA Security+ SY0-501
  • CompTIA Exam Information
    • CompTIA A+ 220-1001
    • CompTIA A+ 220-1002
    • CompTIA A+ 220-901
    • CompTIA A+ 220-902
    • CompTIA Network+ N10-006
    • CompTIA Security+ SY0-401
    • CompTIA Security+ SY0-501
  • Contact
  • Download the App
  • New: Subnet Machine
  • Home
  • CompTIA A+ 220-1002
  • Study Mode

Which statement is true regarding hardware and software tokens?

  • A) Software tokens are a cheaper alternative to hardware tokens
  • B) Hardware tokens are a cheaper alternative to software tokens
  • C) Software tokens are less secure and have been superseded by hardware tokens
  • D) Software tokens should be used for testing purposes only. Real end-users should use hardware tokens.
Next Question

Answer Description

Both Hardware Tokens and Software Tokens provide "something you have" factor authentication. Common hardware tokens are smartcards, USB sticks or one-time-use password generators. Software tokens are generally apps that generate a temporary password. Software tokens are considered a cheaper alternative to hardware tokens, as issuing a hardware token to a large number of users has a high cost. Arguably hardware tokens are more secure, but are less practical and more costly.

Wikipedia

A software token (aka soft token) is a piece of a two-factor authentication security device that may be used to authorize the use of computer services Software tokens are stored on a general-purpose electronic device such as a desktop computer, laptop, PDA, or mobile phone and can be duplicated (Contrast hardware tokens, where the credentials are stored on a dedicated hardware device and therefore cannot be duplicated (absent physical invasion of the device)) Because software tokens are something one does not physically possess, they are exposed to unique threats based on duplication of the underlying cryptographic material - for example, computer viruses and software attacks

Software_token - Wikipedia, the free encyclopedia

A+ 220-1002 Objectives

  • Operating Systems
  • Security
    • This question is filed here
  • Software Troubleshooting
  • Operational Procedures
CompTIA A+ 220-1001 CompTIA A+ 220-1002 CompTIA A+ 220-901 CompTIA A+ 220-902 CompTIA Network+ N10-006 CompTIA Security+ SY0-401 CompTIA Security+ SY0-501
View us on Facebook Follow us on Twitter Find us on Reddit Contact Us

Copyright © CrucialExams.com 2021 (v2.0.0-cf5f7f55d5d573723dd7021a81)
Contact - Sitemap - Download the App - Terms of Service