Like the Kerberos protocol, SESAME is also subject to which of the following?

A.
timeslot replay
B.
password guessing
C.
symmetric key guessing
D.
asymmetric key guessing
Explanation:
Just like Kerberos, SESAME depends on the initial user authentication. For that reason, SESAME has the
same weakness to attacks on the user’s password as Kerberos does.
Incorrect Answers:
A: SESAME is not susceptible to timeslot replay attacks.
C: Symmetric key guessing is not a weakness of Kerberos.
D: Asymmetric key guessing is not a weakness of Kerberos.Miller, David R, CISSP Training Kit, O’Reilly Media, 2013, Sebastopol, p. 101
Conrad, Eric, Seth Misenar, Joshua Feldman, CISSP Study Guide, 2nd Edition, Syngress, Waltham, 2012, p.
46