nerdexam
(ISC)2(ISC)2

CISSP-ISSAP · Question #221

CISSP-ISSAP Question #221: Real Exam Question with Answer & Explanation

Sign in or unlock CISSP-ISSAP to reveal the answer and full explanation for question #221. The question stem and answer options stay visible for context.

Identity and Access Management (IAM) Architecture

Question

Kerberos is a computer network authentication protocol that allows individuals communicating over a non-secure network to prove their identity to one another in a secure manner. Which of the following statements are true about the Kerberos authentication scheme? Each correct answer represents a complete solution. Choose all that apply.

Options

  • AKerberos requires continuous availability of a central server.
  • BDictionary and brute force attacks on the initial TGS response to a client may reveal the
  • CKerberos builds on Asymmetric key cryptography and requires a trusted third party.
  • DKerberos requires the clocks of the involved hosts to be synchronized.

Unlock CISSP-ISSAP to see the answer

You've previewed enough free CISSP-ISSAP questions. Unlock CISSP-ISSAP for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.

Topics

#Kerberos#Authentication Protocols#Symmetric Cryptography#Network Authentication
Full CISSP-ISSAP PracticeBrowse All CISSP-ISSAP Questions