Question
a.
Interaction/ Handshaking between the SSM and the KDC
b.
Establishment of the connection
c.
Release of connection request packet
d.
SSM saves the packet and applies to the KDC for connection permission
Posted under Cryptography and Network Security
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Which is the last step in establishing a connection between hosts using the SSM?
Similar Questions
Discover Related MCQs
Q. Larger networks would prefer a full decentralization.
View solution
Q. Which of these is not a type of session key?
View solution
Q. Which session key is used for electronic funds transfer and point of sale applications?
View solution
Q. Sometimes a simple tag is introduced along with the session key. This tag has 8 bits. Which of the following options is wrong?
View solution
Q. Hash Value = H = h(CV)
Key Input = Km XOR H
Ciphertext = E([Km XOR H],Ks)
What is CV here?
View solution
Q. Which is the correct representation for session key recovery for the plain text?
View solution
Q. Which of the following is required to find the session key?
i) Control Vector
ii) Master Key
iii) Encrypted session Key
View solution
Q. “Meet in the middle attack” and “man in the middle attack” are the same.
View solution
Q. “Meet in the middle attack” is an attack
View solution
Q. Public key encryption/decryption is not preferred because
View solution
Q. Which one of the following is not a public key distribution means?
View solution
Q. What is the PGP stand for?
View solution
Q. PGP makes use of which cryptographic algorithm?
View solution
Q. USENET is related to which of the following Public Key distribution schemes?
View solution
Q. Which of the following public key distribution systems is most secure?
View solution
Q. Which systems use a timestamp?
i) Public-Key Certificates
ii) Public announcements
iii) Publicly available directories
iv) Public-Key authority
View solution
Q. Which of these systems use timestamps as an expiration date?
View solution
Q. Which system uses a trusted third party interface?
View solution
Q. Publicly Available directory is more secure than which other system?
View solution
Q. Extensions were added in which version?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Cryptography and Network Security? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!