Suppose an organization uses Kerberos for authentication. In
terms of security and service availability, what is the
effect if AS or TGS goes down?


Answer Posted / keval bhatt

Point-of-sale terminals that use magnetic-stripe cards and
PIN codes have a fatal flaw: a malicious merchant can modify
his card reader to capture and store all the information on
the card as well as the PIN code in order to post additional
(fake) transactions in the future. The next generation of
point-of-sale terminals will use cards with a complete CPU,
keyboard, and tiny display on the card. Devise a protocol
for this system that malicious merchants cannot break.

Is This Answer Correct ?    1 Yes 7 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Which layer is used to convert packets to frame

1161


What is the baud rate of a standard 10 mbps Ethernet LAN ?

3340


What are the basic functions of the data link layer?

1281


What is count to infinity problem ?

1222


When you look at a Cisco switch like Cisco 2950, why are the ports labeled with an 'X' behind the number? Like 1x, 2x.....23x, 24x, and what does it mean when there is no 'X'?

1509






I need to know the driver name associated with the DSN ? In java we can get it by using getDriverName()(implemented by 3rd party vendors.) method ? but i need the implemetation to get the driver name? so can u give me the code ? how to get the code ?

2141


List out the main responsibilities of the network layer.

1391


What is logical link control

687


What do you understand by the term ‘structured cabling’. State the main rules that should be used when installing a cable. 31. Show that maximum cabling area for LAN for horizontal cabling runs is approximately 200m.

1189


Write two ways in which computer applications differ from network applications ?

1209


Discuss the following terms with respect to ATM: VPI, UNI, asynchronous, AAL, Cell, PVC.

1346


Which one you will use to implement critical section? Binary Semaphore

677


Explain Traffic shaping using token bucket algorithm

1094


Explain 1-persistent, p-persistent and 0-persistent CSMA giving strong and weak points of each.

2585


What do you mean by link to link layers of OSI reference model? Explain their functions briefly?

1547