1.
Which of the following is addressed by Kerberos?
2.
Kerberos is vulnerable to replay in which of the following circumstances?
3.
Like the Kerberos protocol, SESAME is also subject to which of the following?
4.
RADIUS incorporates which of the following services?
5.
Which of the following would constitute the BEST example of a password to use for access to a system by a network administrator?
6.
What ensures that the control mechanisms correctly implement the security policy for the entire life cycle of an information system?
7.
Smart cards are an example of which type of control?
8.
Which of the following is NOT a two-factor authentication mechanism?
9.
Which of following is NOT a service provided by AAA servers (Radius, TACACS and DIAMETER)?
10.
Which of the following protocol was used by the INITIAL version of the Terminal Access Controller Access Control System TACACS for communication between clients and servers?