Help You Ace 2026-2027 Includes Frequently
Tested Questions With ELABORATED 100%
Correct COMPLETE SOLUTIONS
Guaranteed Pass First Attempt!!
Current Update!!
1. Which of the following statements pertaining to using Kerberos without any
extension is false?
A. A client can be impersonated by password-guessing.
B. Kerberos is mostly a third-party authentication protocol.
C. Kerberos uses public key cryptography.
D. Kerberos provides robust authentication - ANSWER C. Kerberos uses public
key cryptography
2. Which of the following statements pertaining to Kerberos is false?
A. The Key Distribution Center represents a single point of failure.
B. Kerberos manages access permissions.
C. Kerberos uses a database to keep a copy of all users' public keys.
D. Kerberos uses symmetric key cryptography - ANSWER C. Kerberos uses a
database to keep a copy of all users' public keys.
,3. Which access control model would a lattice-based access control model be an
example of?
A. Mandatory access control.
B. Discretionary access control.
C. Non-discretionary access control.
D. Rule-based access control - ANSWER A. Mandatory access control
4. Which of the following is an example of discretionary access control?
A. Identity-based access control
B. Task-based access control
C. Role-based access control
D. Rule-based access control - ANSWER A. Identity-based access control
5. Which of the following would be used to implement Mandatory Access Control
(MAC)?
A. Clark-Wilson Access Control
B. Role-based access control
C. Lattice-based access control
D. User dictated access control - ANSWER C. Lattice-based access control
6. Which type of attack involves impersonating a user or a system?
A. Smurfing attack
B. Spoofing attack
C. Spamming attack
,D. Sniffing attack - ANSWER B. Spoofing attack
7. Which of the following is NOT an advantage that TACACS+ has over TACACS?
A. Event logging
B. Use of two-factor password authentication
C. User has the ability to change his password
D. Ability for security tokens to be resynchronized - ANSWER A. Event logging
8. Which of the following remote access authentication systems is the most
robust?
A. TACACS+
B. RADIUS
C. PAP
D. TACACS - ANSWER A. TACAS+
9. Which of the following is an example of a passive attack?
A. Denying services to legitimate users
B. Shoulder surfing
C. Brute-force password cracking
D. Smurfing - ANSWER B. Shoulder surfing
10. What does the Clark-Wilson security model focus on?
A. Confidentiality
, B. Integrity
C. Accountability
D. Availability - ANSWER B. Integrity
11. What does the simple security (ss) property mean in the Bell-LaPadula model?
A. No read up
B. No write down
C. No read down
D. No write up - ANSWER A. No read up
12. What does the (star) property mean in the Bell-LaPadula model?
A. No write up
B. No read up
C. No write down
D. No read down - ANSWER C. No write down
13. What does the (star) integrity axiom mean in the Biba model?
A. No read up
B. No write down
C. No read down
D. No write up - ANSWER D. No write up
14. What does the simple integrity axiom mean in the Biba model?