which of the following?

Like the Kerberos protocol, SESAME is also subject to which of the following?

Like the Kerberos protocol, SESAME is also subject to which of the following?

A.
timeslot replay

B.
password guessing

C.
symmetric key guessing

D.
asymmetric key guessing

Explanation:
Just like Kerberos, SESAME depends on the initial user authentication. For that reason, SESAME has the
same weakness to attacks on the user’s password as Kerberos does.
Incorrect Answers:
A: SESAME is not susceptible to timeslot replay attacks.
C: Symmetric key guessing is not a weakness of Kerberos.
D: Asymmetric key guessing is not a weakness of Kerberos.

Miller, David R, CISSP Training Kit, O’Reilly Media, 2013, Sebastopol, p. 101
Conrad, Eric, Seth Misenar, Joshua Feldman, CISSP Study Guide, 2nd Edition, Syngress, Waltham, 2012, p.
46



Leave a Reply 0

Your email address will not be published. Required fields are marked *