List of questions
Related questions
Question 72 - CISSP-ISSAP discussion
Kerberos is a computer network authentication protocol that allows individuals communicating over a non-secure network to prove their identity to one another in a secure manner. Which of the following statements are true about the Kerberos authentication scheme? Each correct answer represents a complete solution.
Choose all that apply.
A.
Kerberos requires continuous availability of a central server.
B.
Dictionary and brute force attacks on the initial TGS response to a client may reveal the subject's passwords.
C.
Kerberos builds on Asymmetric key cryptography and requires a trusted third party.
D.
Kerberos requires the clocks of the involved hosts to be synchronized.
Your answer:
0 comments
Sorted by
Leave a comment first