ExamQuestions.com

Register
Login
Information Systems Security Architecture Professional (CISSP-ISSAP) Exam Questions

ISC

Information Systems Security Architecture Professional (CISSP-ISSAP)

67 / 115

Question 67:

Kerberos is a computer network authentication protocol that allows individuals communicating over a non-secure network to prove their identity to one another in a secure manner. Which of the following statements are true about the Kerberos authentication scheme? Each correct answer represents a complete solution. Choose all that apply. 

Answer options:

A. Kerberos requires continuous availability of a central server.
B. Dictionary and brute force attacks on the initial TGS response to a client may reveal the subject`s passwords.
C. Kerberos builds on Asymmetric key cryptography and requires a trusted third party.
D. Kerberos requires the clocks of the involved hosts to be synchronized.