0 votes
in Kerberos by
Kerberos Interview Questions and Answers

kerberos port

kerberos authentication process

kerberos authentication example

kerberos active directory

kerberos windows

kerberos mac

kerberos tutorialspoint

kerberos geeksforgeeks

1 Answer

0 votes
by
Question#1 Which cryptography technique uses different keys to encrypt and decrypt?

a) Symmetric encryption

b) Asymmetric encryption

c) Both symmetric and asymmetric encryption

d) None of the options

Answer- Asymmetric encryption

Question#2 Which of the following is not an objective of Kerberos?

a) Passwords should be stored in the user’s machine

b) Passwords should never travel over a network

c) Passwords should be stored in encrypted format

d) None of the options

Answer- Passwords should be stored in the user’s machine

Question#3 Kerberos was developed at ___________.

a) MIT

b) Oxford

c) Stanford

d) None of the options

Answer- MIT

Question#4 Kerberos realm names are case sensitive.

a) True

b) False

Answer- True

Question#5 Authentication checks if a user has rights to access content.

a) True

b) False

Answer- False

Question#6 Username and password are used for _____________.

a) encryption

b) authentication

c) authorization

d) None of the options

Answer- authentication

Question#7 Which of the following mechanism is used to share data securely?

a) Encryption

b) Authentication

c) Authorization

d) None of the options

Answer- Encryption

Question#8 A user is said to be a part of a realm in which of the following scenarios?

a) The user shares a secret key with the authentication server of the realm

b) User has a domain name

c) All the above

Answer- The user shares a secret key with the authentication server of the realm

Question#9 The main flaws in traditional authentication systems that lead to the creation of Kerberos was?

a) Passwords are stored at the service end and may not be encrypted

b) Insecure public network

c) Passwords travel over unknown networks

d) All the above

Answer- All the above

Question#10 Authentication checks for user identity.

a) True

b) False

Answer- True

Question#11 Encryption can be reversed.

a) True

b) False

Answer- True

Question#12 Which of the following is an objective of Kerberos?

a) Passwords are stored in the user’s machine

b) Only KDC can handle authentication

c) All the above

Answer- Only KDC can handle authentication

Question#13 Kerberos was developed as a part of which of the following project?

a) MIT Kerb

b) Athena

c) Kerb-security

d) Marina

Answer- Athena

Question#14 Which cryptography technique uses the same key to encrypt and decrypt?

a) Asymmetric encryption

b) Symmetric encryption

c) Both symmetric and asymmetric encryption

d) None of the options

Answer- Symmetric encryption

Question#15 The key used to encrypt a TGT is shared between?

a) Client and Application Server

b) Ticket Granting Server and Authentication Server

c) Application Server and Service

d) None of the options

Answer- Ticket Granting Server and Authentication Server

Question#16 The session key in a TGT is shared between?

a) Client and Application Server

b) Service and Client

c) Authentication Server and Ticket Granting Server

d) Client and Ticket Granting Server

Answer- Authentication Server and Ticket Granting Server

Question#17 Which component of the KDC issues service tickets?

a) Authentication Server

b) Application Server

c) Ticket Granting Server

d) Database

Answer- Authentication Server

Question#18 Tickets are issued by which of the following?

a) Clients

b) Services

c) KDC

d) None of the options

Answer- KDC

Question#19 A client sends a TGT to?

a) Service

b) Ticket Granting Service

c) Application Server

d) Authentication Server

Answer- Authentication Server

Question#20 A service principal entry should contain the hostname.

a) True

b) False

Answer- True

Question#21 A client can open and view a service ticket.

a) True

b) False

Answer- True

Question#22 Which of the following ticket is sent by the authentication server to the client?

a) Service Ticket

b) TGT

c) Both TGT and Service Ticket

d) None of the options

Answer- TGT

Question#23 Which of the following does Kerberos use as password salt?

a) Principal

b) Service name

c) User name

d) None of the options

Answer- Principal

Question#24 Which of the following method is used to hash a user’s password+salt in Kerberos?

a) XMZ

b) string2Key

c) SHA-256

d) RSA

Answer- string2Key

Question#25 Authentication request will not contain this.

a) service ip

b) client principal

c) service principal

d) IP list

Answer- IP list

Question#26 Which of the following information is not stored in the KDC database?

a) User ID

b) Principal

c) Encryption Key

d) Password Expiry

Answer- Principal

Question#27 A principal can be associated with which of the following?

a) User

b) Host

c) Service

d) All the above

Answer- All the above
...