PrepAway - Latest Free Exam Questions & Answers

which one of the following attacks?

Kerberos can prevent which one of the following attacks?

PrepAway - Latest Free Exam Questions & Answers

A.
Tunneling attack.

B.
Playback (replay) attack.

C.
Destructive attack.

D.
Process attack.

Explanation:
In a Kerberos implementation that is configured to use an authenticator, the user sends to the server her
identification information, a timestamp, as well as sequence number encrypted with the session key that they
share. The server then decrypts this information and compares it with the identification data the KDC sent to it
regarding this requesting user. The server will allow the user access if the data is the same. The timestamp is
used to help fight against replay attacks.
Incorrect Answers:
A: Tunneling attack is not a valid type of attack with regards to Kerberos.C: Destructive attack is not a valid type of attack with regards to Kerberos.
D: Process attack is not a valid type of attack with regards to Kerberos.

Harris, Shon, All In One CISSP Exam Guide, 6th Edition, McGraw-Hill, 2013, p. 212


Leave a Reply