ISC ISSAP Information Systems Security Architecture Professional ISSAP Question # 58 Topic 6 Discussion

ISC ISSAP Information Systems Security Architecture Professional ISSAP Question # 58 Topic 6 Discussion

ISSAP Exam Topic 6 Question 58 Discussion:
Question #: 58
Topic #: 6

Kerberos is a computer network authentication protocol that allows individuals communicating over a non-secure network to prove their identity to one another in a secure manner. Which of the following statements are true about the Kerberos authentication scheme? Each correct answer represents a complete solution. Choose all that apply.


A.

Kerberos requires continuous availability of a central server.


B.

Dictionary and brute force attacks on the initial TGS response to a client may reveal the subject's passwords.


C.

Kerberos builds on Asymmetric key cryptography and requires a trusted third party.


D.

Kerberos requires the clocks of the involved hosts to be synchronized.


Get Premium ISSAP Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.