L18 Flashcards

1
Q

The challenge values in an authentication protocol can be repeatedly used in multiple sessions

a) True
b) False

A

b) False

Repeating challenge values is not secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The authentication messages can be captured and replayed by an adversary

a) True
b) False

A

a) True

Always assume messages sent over the internet can be received by an adversary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authentication can be one-way, e.g., only authenticating Alice to Bob

a) True
b) False

A

b) True

The first 3 steps of the protocol authenticate user to server (Alice to Bob)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A reflection attack is a form of man-in-the-middle attack

a) True
b) False

A

a) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

To defeat a reflection attack, we can use an odd number as challenge from the initiator and even number from the responder

a) True
b) False

A

a) True

The attacker cannot replay the challenge received from the server (an even number) because the server is expecting an odd number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

We can use signing with public keys to achieve mutual authentication

a) True
b) False

A

a) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A session key should be a secret and unique to the session

a) True
b) False

A

a) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authentication should be accomplished before key exchange

a) True
b) False

A

a) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A key benefit of using KDC is for scalability

a) True
b) False

A

a) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In order for Bob to verify Alice’s public key, the certificate authority must be on-line

a) True
b) False

A

b) False

As long as the user has the CA’s public key, they can verify the certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Signing the message exchanges in Diffie-Hellman eliminates the man-in-the-middle attack

a) True
b) False

A

a) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Kerberos provides authentication and access control

a) True
b) False

A

a) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Kerberos also distributes session keys

a) True
b) False

A

a) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

To avoid over-exposure of a user’s master key, Kerberos uses a per-day key and a ticket-granting-ticket

a) True
b) False

A

a) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The authenticators used in requests to KDC and application servers can be omitted

a) True
b) False

A

b) False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Access to any network resource requires a ticket issued by the KDC

a) True
b) False

A

a) True