ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 72 - CISSP-ISSAP discussion

Report
Export

Kerberos is a computer network authentication protocol that allows individuals communicating over a non-secure network to prove their identity to one another in a secure manner. Which of the following statements are true about the Kerberos authentication scheme? Each correct answer represents a complete solution.

Choose all that apply.

A.
Kerberos requires continuous availability of a central server.
Answers
A.
Kerberos requires continuous availability of a central server.
B.
Dictionary and brute force attacks on the initial TGS response to a client may reveal the subject's passwords.
Answers
B.
Dictionary and brute force attacks on the initial TGS response to a client may reveal the subject's passwords.
C.
Kerberos builds on Asymmetric key cryptography and requires a trusted third party.
Answers
C.
Kerberos builds on Asymmetric key cryptography and requires a trusted third party.
D.
Kerberos requires the clocks of the involved hosts to be synchronized.
Answers
D.
Kerberos requires the clocks of the involved hosts to be synchronized.
Suggested answer: A, B, D
asked 18/09/2024
Marrapu Sreenivasarao
31 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first