Question 25 You have recently been hired to perform asecurity audit of the Infos
ID: 3911697 • Letter: Q
Question
Question 25
You have recently been hired to perform asecurity audit of the Infosystems Incopporated campany network. You are currently using a tool to aoudit the password strength of all administrative accounts in the network. The tool is randomly trying all conbinations of passwords between 4-12 charcters in length in order to locate weak passwords. What type of attack is this similar to?
Spoofing attack
Dictianory Attack
Brute Force attack
Man in the middle attack
Question 26
A password and a personal identification number (PIN) are examples of which of the following?
Something you know
Something you make
Something you are
Something you have
27.Which of the following is FALSE regarding Kerberos?
Kerberos uses asymmetric-key cryptography
Kerberos requires that you have a good time source available
Kerberos uses encrypted "tickets" during its process
Kerberos is a secure form of authentication
Question 28
The primary service provided by Kerberos is which of the following?
Authorization
Non-repudiation
Confidentiality
Authentication
Spoofing attack
Dictianory Attack
Brute Force attack
Man in the middle attack
Question 26
A password and a personal identification number (PIN) are examples of which of the following?
Something you know
Something you make
Something you are
Something you have
27.Which of the following is FALSE regarding Kerberos?
Kerberos uses asymmetric-key cryptography
Kerberos requires that you have a good time source available
Kerberos uses encrypted "tickets" during its process
Kerberos is a secure form of authentication
Question 28
The primary service provided by Kerberos is which of the following?
Authorization
Non-repudiation
Confidentiality
Authentication
Explanation / Answer
25.
You have recently been hired to perform asecurity audit of the Infosystems Incopporated campany network. You are currently using a tool to aoudit the password strength of all administrative accounts in the network. The tool is randomly trying all conbinations of passwords between 4-12 charcters in length in order to locate weak passwords. What type of attack is this similar to Brute Force attack
Option 3
26.
A password and a personal identification number (PIN) are examples of Something you know.
Option 1
27.
False
Kerberos uses asymmetric-key cryptography
Since Kerberos uses symmetric-key cryptography
Option 1
28.
The primary service provided by Kerberos is Authentication.
Option 4
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.