Question#1 Which cryptography technique uses different keys to encrypt and decrypt?
a) Symmetric encryption
b) Asymmetric encryption
c) Both symmetric and asymmetric encryption
d) None of the options
Answer- Asymmetric encryption
Question#2 Which of the following is not an objective of Kerberos?
a) Passwords should be stored in the user’s machine
b) Passwords should never travel over a network
c) Passwords should be stored in encrypted format
d) None of the options
Answer- Passwords should be stored in the user’s machine
Question#3 Kerberos was developed at ___________.
a) MIT
b) Oxford
c) Stanford
d) None of the options
Answer- MIT
Question#4 Kerberos realm names are case sensitive.
a) True
b) False
Answer- True
Question#5 Authentication checks if a user has rights to access content.
a) True
b) False
Answer- False
Question#6 Username and password are used for _____________.
a) encryption
b) authentication
c) authorization
d) None of the options
Answer- authentication
Question#7 Which of the following mechanism is used to share data securely?
a) Encryption
b) Authentication
c) Authorization
d) None of the options
Answer- Encryption
Question#8 A user is said to be a part of a realm in which of the following scenarios?
a) The user shares a secret key with the authentication server of the realm
b) User has a domain name
c) All the above
Answer- The user shares a secret key with the authentication server of the realm
Question#9 The main flaws in traditional authentication systems that lead to the creation of Kerberos was?
a) Passwords are stored at the service end and may not be encrypted
b) Insecure public network
c) Passwords travel over unknown networks
d) All the above
Answer- All the above
Question#10 Authentication checks for user identity.
a) True
b) False
Answer- True
Question#11 Encryption can be reversed.
a) True
b) False
Answer- True
Question#12 Which of the following is an objective of Kerberos?
a) Passwords are stored in the user’s machine
b) Only KDC can handle authentication
c) All the above
Answer- Only KDC can handle authentication
Question#13 Kerberos was developed as a part of which of the following project?
a) MIT Kerb
b) Athena
c) Kerb-security
d) Marina
Answer- Athena
Question#14 Which cryptography technique uses the same key to encrypt and decrypt?
a) Asymmetric encryption
b) Symmetric encryption
c) Both symmetric and asymmetric encryption
d) None of the options
Answer- Symmetric encryption
Question#15 The key used to encrypt a TGT is shared between?
a) Client and Application Server
b) Ticket Granting Server and Authentication Server
c) Application Server and Service
d) None of the options
Answer- Ticket Granting Server and Authentication Server
Question#16 The session key in a TGT is shared between?
a) Client and Application Server
b) Service and Client
c) Authentication Server and Ticket Granting Server
d) Client and Ticket Granting Server
Answer- Authentication Server and Ticket Granting Server
Question#17 Which component of the KDC issues service tickets?
a) Authentication Server
b) Application Server
c) Ticket Granting Server
d) Database
Answer- Authentication Server
Question#18 Tickets are issued by which of the following?
a) Clients
b) Services
c) KDC
d) None of the options
Answer- KDC
Question#19 A client sends a TGT to?
a) Service
b) Ticket Granting Service
c) Application Server
d) Authentication Server
Answer- Authentication Server
Question#20 A service principal entry should contain the hostname.
a) True
b) False
Answer- True
Question#21 A client can open and view a service ticket.
a) True
b) False
Answer- True
Question#22 Which of the following ticket is sent by the authentication server to the client?
a) Service Ticket
b) TGT
c) Both TGT and Service Ticket
d) None of the options
Answer- TGT
Question#23 Which of the following does Kerberos use as password salt?
a) Principal
b) Service name
c) User name
d) None of the options
Answer- Principal
Question#24 Which of the following method is used to hash a user’s password+salt in Kerberos?
a) XMZ
b) string2Key
c) SHA-256
d) RSA
Answer- string2Key
Question#25 Authentication request will not contain this.
a) service ip
b) client principal
c) service principal
d) IP list
Answer- IP list
Question#26 Which of the following information is not stored in the KDC database?
a) User ID
b) Principal
c) Encryption Key
d) Password Expiry
Answer- Principal
Question#27 A principal can be associated with which of the following?
a) User
b) Host
c) Service
d) All the above
Answer- All the above