Question 29 Kerberos V4 and V5 is vulnerable against which of the following atta
ID: 3911698 • Letter: Q
Question
Question 29
Kerberos V4 and V5 is vulnerable against which of the following attacks?
Modification attacks
Man-in-the middle attacks
Password Attacks
IP Spoofing
Question 30
Which of the following is true of RSA?
It has much smaller key sizes than DES and AES
It has replaced DES
It uses the same key to encryp and decrypt
It relies on the difficulty of factoring large numbers for its strength
Question 31
Asymmetric cryptography is based on the work of which of the following?
Diffe-Hellman
NIST
IEEE
ANSI
32Authentication that can be determined with a high degree to be qenuine and is a service in which those who are involved cannot deny that they have participated is called what?
Privacy
Authorization
Identification and authorization
Non-repudiation
Modification attacks
Man-in-the middle attacks
Password Attacks
IP Spoofing
Question 30
Which of the following is true of RSA?
It has much smaller key sizes than DES and AES
It has replaced DES
It uses the same key to encryp and decrypt
It relies on the difficulty of factoring large numbers for its strength
Question 31
Asymmetric cryptography is based on the work of which of the following?
Diffe-Hellman
NIST
IEEE
ANSI
32Authentication that can be determined with a high degree to be qenuine and is a service in which those who are involved cannot deny that they have participated is called what?
Privacy
Authorization
Identification and authorization
Non-repudiation
Explanation / Answer
Answer 29 :- Password attacks; since Password authentication protocol is the loophole in kerberoes
Answer 30:- It relieson Difficulty of factoring large numbers for its strength
Answer 31:- Diffie-hellman
Answer 32:- Non-Repudiation
Thankyou
Please Upvote
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.