PrepAway - Latest Free Exam Questions & Answers

Tag: CISSP

Which of the following are issues pertaining to Kerberos?

The Kerberos technology has some issues that need to be understood before access control implementation.. Which of the following are issues pertaining to Kerberos?

i.The KDC can be a single point of failure. If the KDC goes down, no one canaccess needed resources. Redundancy is necessary for the KDC.
ii. The KDC must be able to handle the number of requests it receives in a timelymanner. It must be scalable.
iii. Secret keys are temporarily stored on the users’ workstations, which means itis possible for an intruder to obtain these cryptographic keys.
iv. Session keys are decrypted and reside on the users’ workstations, either in acache or in a key table. Again, an intruder can capture these keys.

What kind of attack has Carol committed?

Recently passed over for an executive promotion, Carol is anxious to hear abouta major company announcement which will most likely reveal the new hire. Knowingthat the PR department does not regularly shred documents, she snoops around thehallways after hours, and finds a memo next to the printer that gives her theinformation that will be released to the public next week. What kind of attack has Carol committed?


Page 135 of 250« First...102030...133134135136137...140150160...Last »