Security Protocols Flashcards

1
Q

The challenge values used an an authentication protocol can be repeatedly used in multiple sessions

A

falseP2 L9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The authentication messages can be captured and replayed by an adversary

A

trueP2 L9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authentication can be one-way, e.g. only authenticating Alice to Bob

A

trueP2 L9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A reflection attack is a form of man-in-the-middle-attack

A

trueP2 L9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

To defeat a reflection attack, we can use an odd number as a challenge from the initiator and an even number from the responder

A

trueP2 L9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

We can use signing with public keys to achieve mutual authentication

A

trueP2 L9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A session key should be a secret and unique to the session

A

trueP2 L9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authentication should be accomplished before the session key exchange

A

trueP2 L9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A key benefit of using KDC (Key distribution center) is scalability

A

trueP2 L9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In order to for Bob to verify Alice’s public key, the certificate authority must be online

A

false (just need the CA’s public key, which may be cached)P2 L9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Signing the message exchanges in Diffie-Helman eliminates the man-in-the-middle attack during session key exchange.

A

trueP2 L9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Kerberos provides authentication and access control

A

trueP2 L9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Kerberos distributes session keys

A

trueP2 L9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

To avoid over-exposure of a user’s master key, Kerberos uses a per-day key and a ticket-granting-ticket

A

trueP2 L9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The authenticators used in requests to KDC and application server can be omitted in Kerberos

A

falseP2 L9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Access to any network resource requires a ticket issued by the KDC in Kerberos

A

trueP2 L9