Which of the following can be provided by Kerberos? (Choose THREE)
Mutual Authentication
Single Sign on
Communications confidentaiality
Strong Authentication
Answer)
Some of the following which can be provided by the Kerberos are as follows:
1) Mutual Authentication:
The client-server model provides mutual authentication for both the user as well as a server which in turn would verify one another's identity. And also Kerberos protocol message would protect against the eavesdropping as well as replay the attacks which mostly uses the 88 UDP port.
2) Single Sign-On
This is where the user authentication happens mostly by providing the user name as well as password and would also use the application along with the services following which it would not need any username as well as password to be given again. There is this key feature which provides the SSO
4) Strong Authentication:
There is a distributed authentication service that is being allowed to a process that runs with regards to the user and gives a better identity to the verifier even when the data is not being sent via the network. This maintains strong authentication.
Which of the following can be provided by Kerberos? (Choose THREE) Mutual Authentication &
After a systems administrator installed and configured kerberos services, several users experienced authentication issues. Which of the following should be installed to resolve these issues? A. RADIUS server B. NTLM service C. LDAP service D. NTP server
Authentication Protocol: 3 Marks] Q4 (Authentication Protocol) The following mutual authentication protocol is proposed based on a symmetric-key cryptography algorithm. We assume that the cryptography algorithm that is used here is secure. Given that the following protocol does not provide mutual authentication. Give two different attack scenarios where Trudy can convince Bob that she is Alice. Briefly explain each attack scenario performed by Trudy with proper diagram which on the protocol. "Alice",R E(R, KAB E(R+1, KAB) Alice Bob [Hints: You...
a) Briefly describe the role of Single Sign On in authentication technologies. b) Compare and contrast Access Control Lists with Role Based Access Control (RBAC) system. c) Briefly discuss the difference between Discretionary Access Control and Mandatory Access Control. Give examples to elaborate your point of view. d) Describe how the following technologies are employed for securing TCP/IP implementations: 1. SSL (Secure Socket Layer) 2. IPSec (IP Security) 3. Kerberos
Briefly explain each attack scenario performed by Trudy with a proper diagram which on the protocol. Q4 (Authentication Protocol) [3 Marks] The following mutual authentication protocol is proposed based on a symmetric-key cryptography algorithm. We assume that the cryptography algorithm that is used here is secure. Given that the following protocol does not provide mutual authentication. Give two different attack scenarios where Trudy can convince Bob that she is Alice. Briefly explain each attack scenario performed by Trudy with proper...
D Question 18 4 pts Which of the following statements is incorrect about Management of Public Keys? • public-key cryptography makes it possible for people who do not share a common key in advance to communicate securely; if Alice and Bob do not know each other and Alice wants to obtain Bob's public key, he can simply post it on his web site an organization that certifies public keys is called a Certification Authority (CA), it issues aj certificate after...
9. Describe three attack types that a message authentication code can prevent. [6 marks] 10.Explain why a checksum or CRC, by itself, does not provide security. [5 Marks)
(Authentication with Alice cheating) Let’s assume Trudy is Alice’s little sister. Alice produces the message “Transfer $100,000 from Bob to Trudy’s account” and appends it with a valid signature sign(x) of Bob. She then claims that she received this message from Bob. Can Bob prove that he could not have signed this message? 1. In this problem, we will compare the security services provided by Digital Signatures (DS) and Message Authentication Codes (MAC). We assume that Trudy is able to...
Problem 5: Key Distribution and Authentication Recall the following X.509 authentication and key distribution protocols discussed in class 12.1,".B,other..[Kablpxsx, Two-msg A B PK, SK Three-msg Where ti is the time-stamp from party i, ri Is a nonce generated by party i, Прк, denotes encryption using party i's public key, and s, denotes a message signed using i's private key. A and B represent Alice's and Bob's identifiers, respectively. For each of the following changes made to these protocols, comment on...
In how many ways can an investor select three mutual funds for his investment portfolio from a recommended list of ten mutual funds? ways