Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Question 25 You have recently been hired to perform asecurity audit of the Infos

ID: 3911697 • Letter: Q

Question

Question 25

You have recently been hired to perform asecurity audit of the Infosystems Incopporated campany network. You are currently using a tool to aoudit the password strength of all administrative accounts in the network. The tool is randomly trying all conbinations of passwords between 4-12 charcters in length in order to locate weak passwords. What type of attack is this similar to?

Spoofing attack

Dictianory Attack

Brute Force attack

Man in the middle attack

Question 26

A password and a personal identification number (PIN) are examples of which of the following?

Something you know

Something you make

Something you are

Something you have

27.Which of the following is FALSE regarding Kerberos?

Kerberos uses asymmetric-key cryptography

Kerberos requires that you have a good time source available

Kerberos uses encrypted "tickets" during its process

Kerberos is a secure form of authentication

Question 28

The primary service provided by Kerberos is which of the following?

Authorization

Non-repudiation

Confidentiality

Authentication

Spoofing attack

Dictianory Attack

Brute Force attack

Man in the middle attack

Question 26

A password and a personal identification number (PIN) are examples of which of the following?

Something you know

Something you make

Something you are

Something you have

27.Which of the following is FALSE regarding Kerberos?

Kerberos uses asymmetric-key cryptography

Kerberos requires that you have a good time source available

Kerberos uses encrypted "tickets" during its process

Kerberos is a secure form of authentication

Question 28

The primary service provided by Kerberos is which of the following?

Authorization

Non-repudiation

Confidentiality

Authentication

Explanation / Answer

25.

You have recently been hired to perform asecurity audit of the Infosystems Incopporated campany network. You are currently using a tool to aoudit the password strength of all administrative accounts in the network. The tool is randomly trying all conbinations of passwords between 4-12 charcters in length in order to locate weak passwords. What type of attack is this similar to Brute Force attack

Option 3

26.

A password and a personal identification number (PIN) are examples of Something you know.

Option 1

27.

False

Kerberos uses asymmetric-key cryptography

Since Kerberos uses symmetric-key cryptography

Option 1

28.

The primary service provided by Kerberos is Authentication.

Option 4

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote