---Advertisement---
Internet protocol (IP) Microservices

Kerberos Interview Question-Answer

By smart_answer13

Updated on:

---Advertisement---

Q.1 Which cryptography technique uses different keys to encrypt and decrypt?

       A. Symmetric encryption

       B. Asymmetric encryption

       C. Both symmetric and asymmetric encryption

       D. None of the options

Ans : Asymmetric encryption


Q.2 Which of the following is not an objective of Kerberos?

       A. Passwords should be stored in the user’s machine

       B. Passwords should never travel over a network

       C. Passwords should be stored in encrypted format

       D. None of the options

Ans : Passwords should be stored in the user’s machine


Q.3 Kerberos was developed at ___________.

       A. MIT

       B. Oxford

       C. Stanford

       D. None of the options

Ans : MIT


Q.4 Kerberos realm names are case sensitive.

       A. True

       B. False

Ans : True


Q.5 Authentication checks if a user has rights to access content.

       A. True

       B. False

Ans : False


Q.6 Username and password are used for _____________.

       A. encryption

       B. authentication

       C. authorization

       D. None of the options

Ans : authentication


Q.7 Which of the following mechanism is used to share data securely?

       A. Encryption

       B. Authentication

       C. Authorization

       D. None of the options

Ans : Encryption


Q.8 A user is said to be a part of a realm in which of the following scenarios?

       A. The user shares a secret key with the authentication server of the realm

       B. User has a domain name

       C. All the above

Ans : The user shares a secret key with the authentication server of the realm


Q.9 The main flaws in traditional authentication systems that lead to the creation of Kerberos was?

       A. Passwords are stored at the service end and may not be encrypted

       B. Insecure public network

       C. Passwords travel over unknown networks

       D. All the above

Ans : All the above


Q.10 Authentication checks for user identity.

       A. True

       B. False

Ans : True


Q.11 Encryption can be reversed.

       A. True

       B. False

Ans : True


Q.12 Which of the following is an objective of Kerberos?

       A. Passwords are stored in the user’s machine

       B. Only KDC can handle authentication

       C. All the above

Ans : Only KDC can handle authentication


Q.13 Kerberos was developed as a part of which of the following project?

       A. MIT Kerb

       B. Athena

       C. Kerb-security

       D. Marina

Ans : Athena


Q.14 Which cryptography technique uses the same key to encrypt and decrypt?

       A. Asymmetric encryption

       B. Symmetric encryption

       C. Both symmetric and asymmetric encryption

       D. None of the options

Ans : Symmetric encryption


Q.15 The key used to encrypt a TGT is shared between?

       A. Client and Application Server

       B. Ticket Granting Server and Authentication Server

       C. Application Server and Service

       D. None of the options

Ans : Ticket Granting Server and Authentication Server


Q.16 The session key in a TGT is shared between?

       A. Client and Application Server

       B. Service and Client

       C. Authentication Server and Ticket Granting Server

       D. Client and Ticket Granting Server

Ans : Authentication Server and Ticket Granting Server


Q.17 Which component of the KDC issues service tickets?

       A. Authentication Server

       B. Application Server

       C. Ticket Granting Server

       D. Database

Ans : Authentication Server


Q.18 Tickets are issued by which of the following?

       A. Clients

       B. Services

       C. KDC

       D. None of the options

Ans : KDC


Q.19 A client sends a TGT to?

       A. Service

       B. Ticket Granting Service

       C. Application Server

       D. Authentication Server

Ans : Authentication Server


Q.20 A service principal entry should contain the hostname.

       A. True

       B. False

Ans : True


Q.21 A client can open and view a service ticket.

       A. True

       B. False

Ans : True


Q.22 Which of the following ticket is sent by the authentication server to the client?

       A. Service Ticket

       B. TGT

       C. Both TGT and Service Ticket

       D. None of the options

Ans : TGT


Q.23 Which of the following does Kerberos use as password salt?

       A. Principal

       B. Service name

       C. User name

       D. None of the options

Ans : Principal


Q.24 Which of the following method is used to hash a user’s password+salt in Kerberos?

       A. XMZ

       B. string2Key

       C. SHA-256

       D. RSA

Ans : string2Key


Q.25 Authentication request will not contain this.

       A. service ip

       B. client principal

       C. service principal

       D. IP list

Ans : IP list


Q.26 Which of the following information is not stored in the KDC database?

       A. User ID

       B. Principal

       C. Encryption Key

       D. Password Expiry

Ans : Principal


Q.27 A principal can be associated with which of the following?

       A. User

       B. Host

       C. Service

       D. All the above

Ans : All the above


smart_answer13

---Advertisement---

Related Post

Zipkin-Jaeger Interview Question-Answer

Q.1 Which is responsible for sending spans to storage?        A. Transport        B. Collector        C. Component        D. ...

Weaveworks Interview Question-Answer

Q.1 Which of the following features offered by WeaveClouds?        A. Observability        B. VCS integration        C. none of the mentioned ...

Vaadin Unplugged Interview Question-Answer

Q.1 Which of the Programming Model is not supported by Vaadin?        A. Browser        B. Client Side        C. Server Side ...

Spring Boot Framework Interview Question-Answer Part – 2

Q.1 The annotation used to import additional configuration classes is ___________.        A. @Import        B. @Include        C. @EnableImport     ...

Leave a Comment