When configuring multifactor authentication for a traveling employee, you decide to deploy a phone-based one-time password (OTP) that refreshes every 30 seconds. Besides adding a second factor, which primary security advantage does this mechanism offer over the employee's original static password-only login?
It prevents captured credentials from being reused in a replay attack.
It eliminates the need for the employee to remember any passcode at all.
It verifies the user's identity through a biometric measurement.
It encrypts all data sent between the mobile device and the portal.
An OTP is generated for a single session and becomes invalid almost immediately after use or timeout. Because the code cannot be reused, an attacker who intercepts it cannot replay the credential to gain access. The other options describe capabilities not provided by OTP itself: it does not encrypt all traffic, is not a biometric factor, and still requires the user to enter a code-even if the code changes frequently.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a replay attack in cybersecurity?
Open an interactive chat with Bash
How does a one-time password (OTP) system work?
Open an interactive chat with Bash
Why is phone-based OTP considered more secure than static passwords?