Q.1 Which cryptography technique uses different keys to encrypt and decrypt?
A. Symmetric encryption
B. Asymmetric encryption
C. Both symmetric and asymmetric encryption
D. None of the options
Ans : Asymmetric encryption
Q.2 Which of the following is not an objective of Kerberos?
A. Passwords should be stored in the user’s machine
B. Passwords should never travel over a network
C. Passwords should be stored in encrypted format
D. None of the options
Ans : Passwords should be stored in the user’s machine
Q.3 Kerberos was developed at ___________.
A. MIT
B. Oxford
C. Stanford
D. None of the options
Ans : MIT
Q.4 Kerberos realm names are case sensitive.
A. True
B. False
Ans : True
Q.5 Authentication checks if a user has rights to access content.
A. True
B. False
Ans : False
Q.6 Username and password are used for _____________.
A. encryption
B. authentication
C. authorization
D. None of the options
Ans : authentication
Q.7 Which of the following mechanism is used to share data securely?
A. Encryption
B. Authentication
C. Authorization
D. None of the options
Ans : Encryption
Q.8 A user is said to be a part of a realm in which of the following scenarios?
A. The user shares a secret key with the authentication server of the realm
B. User has a domain name
C. All the above
Ans : The user shares a secret key with the authentication server of the realm
Q.9 The main flaws in traditional authentication systems that lead to the creation of Kerberos was?
A. Passwords are stored at the service end and may not be encrypted
B. Insecure public network
C. Passwords travel over unknown networks
D. All the above
Ans : All the above
Q.10 Authentication checks for user identity.
A. True
B. False
Ans : True
Q.11 Encryption can be reversed.
A. True
B. False
Ans : True
Q.12 Which of the following is an objective of Kerberos?
A. Passwords are stored in the user’s machine
B. Only KDC can handle authentication
C. All the above
Ans : Only KDC can handle authentication
Q.13 Kerberos was developed as a part of which of the following project?
A. MIT Kerb
B. Athena
C. Kerb-security
D. Marina
Ans : Athena
Q.14 Which cryptography technique uses the same key to encrypt and decrypt?
A. Asymmetric encryption
B. Symmetric encryption
C. Both symmetric and asymmetric encryption
D. None of the options
Ans : Symmetric encryption
Q.15 The key used to encrypt a TGT is shared between?
A. Client and Application Server
B. Ticket Granting Server and Authentication Server
C. Application Server and Service
D. None of the options
Ans : Ticket Granting Server and Authentication Server
Q.16 The session key in a TGT is shared between?
A. Client and Application Server
B. Service and Client
C. Authentication Server and Ticket Granting Server
D. Client and Ticket Granting Server
Ans : Authentication Server and Ticket Granting Server
Q.17 Which component of the KDC issues service tickets?
A. Authentication Server
B. Application Server
C. Ticket Granting Server
D. Database
Ans : Authentication Server
Q.18 Tickets are issued by which of the following?
A. Clients
B. Services
C. KDC
D. None of the options
Ans : KDC
Q.19 A client sends a TGT to?
A. Service
B. Ticket Granting Service
C. Application Server
D. Authentication Server
Ans : Authentication Server
Q.20 A service principal entry should contain the hostname.
A. True
B. False
Ans : True
Q.21 A client can open and view a service ticket.
A. True
B. False
Ans : True
Q.22 Which of the following ticket is sent by the authentication server to the client?
A. Service Ticket
B. TGT
C. Both TGT and Service Ticket
D. None of the options
Ans : TGT
Q.23 Which of the following does Kerberos use as password salt?
A. Principal
B. Service name
C. User name
D. None of the options
Ans : Principal
Q.24 Which of the following method is used to hash a user’s password+salt in Kerberos?
A. XMZ
B. string2Key
C. SHA-256
D. RSA
Ans : string2Key
Q.25 Authentication request will not contain this.
A. service ip
B. client principal
C. service principal
D. IP list
Ans : IP list
Q.26 Which of the following information is not stored in the KDC database?
A. User ID
B. Principal
C. Encryption Key
D. Password Expiry
Ans : Principal
Q.27 A principal can be associated with which of the following?
A. User
B. Host
C. Service
D. All the above
Ans : All the above