Which of the following is NOT true of the Kerberos protocol?

Which of the following is NOT true of the Kerberos protocol?A .  Only a single login is required per session.B .  The initial authentication steps are done using public key algorithm.C .  The KDC is aware of all systems in the network and is trusted by all of themD ....

March 19, 2019 No Comments READ MORE +

Which of the following protects a password from eavesdroppers and supports the encryption of communication?

Which of the following protects a password from eavesdroppers and supports the encryption of communication?A .  Challenge Handshake Authentication Protocol (CHAP)B .  Challenge Handshake Identification Protocol (CHIP)C .  Challenge Handshake Encryption Protocol (CHEP)D .  Challenge Handshake Substitution Protocol (CHSP)View AnswerAnswer: A Explanation: CHAP: A protocol that uses a three way...

March 19, 2019 No Comments READ MORE +

Annualized Loss Expectancy (ALE) value is derived from an algorithm of the product of annual rate of occurrence and

Annualized Loss Expectancy (ALE) value is derived from an algorithm of the product of annual rate of occurrence andA . Cost of all losses expected.B . Previous year's actual loss.C . Average of previous losses.D . Single loss expectancy.View AnswerAnswer: D

March 19, 2019 No Comments READ MORE +

What is called the verification that the user's claimed identity is valid and is usually implemented through a user password at log-on time?

What is called the verification that the user's claimed identity is valid and is usually implemented through a user password at log-on time?A .  AuthenticationB .  IdentificationC .  IntegrityD .  ConfidentialityView AnswerAnswer: A Explanation: Authentication is verification that the user's claimed identity is valid and is usually implemented through a...

March 18, 2019 No Comments READ MORE +

Management can expect penetration tests to provide all of the following EXCEPT

Management can expect penetration tests to provide all of the following EXCEPTA . identification of security flawsB . demonstration of the effects of the flawsC . a method to correct the security flaws.D . verification of the levels of existing infiltration resistanceView AnswerAnswer: C

March 18, 2019 No Comments READ MORE +

Which one of the following authentication mechanisms creates a problem for mobile users?

Which one of the following authentication mechanisms creates a problem for mobile users?A .  Mechanisms based on IP addressesB .  Mechanism with reusable passwordsC .  One-time password mechanism.D .  Challenge response mechanism.View AnswerAnswer: A Explanation: Anything based on a fixed IP address would be a problem for mobile users because...

March 18, 2019 No Comments READ MORE +

Which of the following is true of biometrics?

Which of the following is true of biometrics?A .  It is used for identification in physical controls and it is not used in logical controls.B .  It is used for authentication in physical controls and for identification in logical controls.C .  It is used for identification in physical controls and...

March 18, 2019 No Comments READ MORE +

Kerberos is vulnerable to replay in which of the following circumstances?

Kerberos is vulnerable to replay in which of the following circumstances?A .  When a private key is compromised within an allotted time window.B .  When a public key is compromised within an allotted time window.C .  When a ticket is compromised within an allotted time window.D .  When the KSD...

March 18, 2019 No Comments READ MORE +

In biometric identification systems, the parts of the body conveniently available for identification are:

In biometric identification systems, the parts of the body conveniently available for identification are:A .  neck and mouthB .  hands, face, and eyesC .  feet and hairD .  voice and neckView AnswerAnswer: B Explanation: Today implementation of fast, accurate, reliable, and user-acceptable biometric identification systems are already under way. Because...

March 18, 2019 No Comments READ MORE +

Technical controls such as encryption and access control can be built into the operating system, be software applications, or can be supplemental hardware/software units. Such controls, also known as logical controls, represent which pairing?

Technical controls such as encryption and access control can be built into the operating system, be software applications, or can be supplemental hardware/software units. Such controls, also known as logical controls, represent which pairing?A .  Preventive/Administrative PairingB .  Preventive/Technical PairingC .  Preventive/Physical PairingD .  Detective/Technical PairingView AnswerAnswer: B Explanation: Preventive/Technical...

March 17, 2019 No Comments READ MORE +