| {"doc": {"question": "Which of the following styles of fuzzer is more likely to explore paths covering every line of code in the following program?", "subject": "computer_security", "choices": ["A", "B", "C", "D"], "answer": 2, "index": 0, "query": "Question: Which of the following styles of fuzzer is more likely to explore paths covering every line of code in the following program?\n A. Generational\n B. Blackbox\n C. Whitebox\n D. Mutation-based\nAnswer:", "gold": 2}, "task_name": "mmlu_computer_security:mc", "doc_id": 0, "native_id": 0, "label": 2, "requests": [{"request_type": "loglikelihood", "request": {"context": "The following are multiple choice questions (with answers) about computer security.\n\nQuestion: SHA-1 has a message digest of\n A. 160 bits\n B. 512 bits\n C. 628 bits\n D. 820 bits\nAnswer: A\n\nQuestion: _____________ can modify data on your system \u2013 so that your system doesn\u2019t run correctly or you can no longer access specific data, or it may even ask for ransom in order to give your access.\n A. IM \u2013 Trojans\n B. Backdoor Trojans\n C. Trojan-Downloader\n D. Ransom Trojan\nAnswer: D\n\nQuestion: What is ethical hacking?\n A. \"Hacking\" ethics so they justify unintended selfish behavior\n B. Hacking systems (e.g., during penetration testing) to expose vulnerabilities so they can be fixed, rather than exploited\n C. Hacking into systems run by those whose ethics you disagree with\n D. A slang term for rapid software development, e.g., as part of hackathons\nAnswer: B\n\nQuestion: Exploitation of the Heartbleed bug permits\n A. overwriting cryptographic keys in memory\n B. a kind of code injection\n C. a read outside bounds of a buffer\n D. a format string attack\nAnswer: C\n\nQuestion: The ____________ is anything which your search engine cannot search.\n A. Haunted web\n B. World Wide Web\n C. Surface web\n D. Deep Web\nAnswer: D\n\nQuestion: Which of the following styles of fuzzer is more likely to explore paths covering every line of code in the following program?\n A. Generational\n B. Blackbox\n C. Whitebox\n D. Mutation-based\nAnswer:", "continuation": " A"}, "idx": 0}, {"request_type": "loglikelihood", "request": {"context": "The following are multiple choice questions (with answers) about computer security.\n\nQuestion: SHA-1 has a message digest of\n A. 160 bits\n B. 512 bits\n C. 628 bits\n D. 820 bits\nAnswer: A\n\nQuestion: _____________ can modify data on your system \u2013 so that your system doesn\u2019t run correctly or you can no longer access specific data, or it may even ask for ransom in order to give your access.\n A. IM \u2013 Trojans\n B. Backdoor Trojans\n C. Trojan-Downloader\n D. Ransom Trojan\nAnswer: D\n\nQuestion: What is ethical hacking?\n A. \"Hacking\" ethics so they justify unintended selfish behavior\n B. Hacking systems (e.g., during penetration testing) to expose vulnerabilities so they can be fixed, rather than exploited\n C. Hacking into systems run by those whose ethics you disagree with\n D. A slang term for rapid software development, e.g., as part of hackathons\nAnswer: B\n\nQuestion: Exploitation of the Heartbleed bug permits\n A. overwriting cryptographic keys in memory\n B. a kind of code injection\n C. a read outside bounds of a buffer\n D. a format string attack\nAnswer: C\n\nQuestion: The ____________ is anything which your search engine cannot search.\n A. Haunted web\n B. World Wide Web\n C. Surface web\n D. Deep Web\nAnswer: D\n\nQuestion: Which of the following styles of fuzzer is more likely to explore paths covering every line of code in the following program?\n A. Generational\n B. Blackbox\n C. Whitebox\n D. Mutation-based\nAnswer:", "continuation": " B"}, "idx": 1}, {"request_type": "loglikelihood", "request": {"context": "The following are multiple choice questions (with answers) about computer security.\n\nQuestion: SHA-1 has a message digest of\n A. 160 bits\n B. 512 bits\n C. 628 bits\n D. 820 bits\nAnswer: A\n\nQuestion: _____________ can modify data on your system \u2013 so that your system doesn\u2019t run correctly or you can no longer access specific data, or it may even ask for ransom in order to give your access.\n A. IM \u2013 Trojans\n B. Backdoor Trojans\n C. Trojan-Downloader\n D. Ransom Trojan\nAnswer: D\n\nQuestion: What is ethical hacking?\n A. \"Hacking\" ethics so they justify unintended selfish behavior\n B. Hacking systems (e.g., during penetration testing) to expose vulnerabilities so they can be fixed, rather than exploited\n C. Hacking into systems run by those whose ethics you disagree with\n D. A slang term for rapid software development, e.g., as part of hackathons\nAnswer: B\n\nQuestion: Exploitation of the Heartbleed bug permits\n A. overwriting cryptographic keys in memory\n B. a kind of code injection\n C. a read outside bounds of a buffer\n D. a format string attack\nAnswer: C\n\nQuestion: The ____________ is anything which your search engine cannot search.\n A. Haunted web\n B. World Wide Web\n C. Surface web\n D. Deep Web\nAnswer: D\n\nQuestion: Which of the following styles of fuzzer is more likely to explore paths covering every line of code in the following program?\n A. Generational\n B. Blackbox\n C. Whitebox\n D. Mutation-based\nAnswer:", "continuation": " C"}, "idx": 2}, {"request_type": "loglikelihood", "request": {"context": "The following are multiple choice questions (with answers) about computer security.\n\nQuestion: SHA-1 has a message digest of\n A. 160 bits\n B. 512 bits\n C. 628 bits\n D. 820 bits\nAnswer: A\n\nQuestion: _____________ can modify data on your system \u2013 so that your system doesn\u2019t run correctly or you can no longer access specific data, or it may even ask for ransom in order to give your access.\n A. IM \u2013 Trojans\n B. Backdoor Trojans\n C. Trojan-Downloader\n D. Ransom Trojan\nAnswer: D\n\nQuestion: What is ethical hacking?\n A. \"Hacking\" ethics so they justify unintended selfish behavior\n B. Hacking systems (e.g., during penetration testing) to expose vulnerabilities so they can be fixed, rather than exploited\n C. Hacking into systems run by those whose ethics you disagree with\n D. A slang term for rapid software development, e.g., as part of hackathons\nAnswer: B\n\nQuestion: Exploitation of the Heartbleed bug permits\n A. overwriting cryptographic keys in memory\n B. a kind of code injection\n C. a read outside bounds of a buffer\n D. a format string attack\nAnswer: C\n\nQuestion: The ____________ is anything which your search engine cannot search.\n A. Haunted web\n B. World Wide Web\n C. Surface web\n D. Deep Web\nAnswer: D\n\nQuestion: Which of the following styles of fuzzer is more likely to explore paths covering every line of code in the following program?\n A. Generational\n B. Blackbox\n C. Whitebox\n D. Mutation-based\nAnswer:", "continuation": " D"}, "idx": 3}]} |
| {"doc": {"question": "Assume that a TLS connection has been established successfully between a client and a server. Establishing the session included checking the server certificate and executing a DiffieHelmann exchange, but the client did not provide a client certificate. Further, assume that the client and server are honest, that the client and server don\u2019t leak their keys, and that the cryptography is good. Which of the following attacks does TLS protect against?\n1. An attacker replaying bytes that a client sent earlier.\n2. An attacker impersonating the server.", "subject": "computer_security", "choices": ["A", "B", "C", "D"], "answer": 0, "index": 1, "query": "Question: Assume that a TLS connection has been established successfully between a client and a server. Establishing the session included checking the server certificate and executing a DiffieHelmann exchange, but the client did not provide a client certificate. Further, assume that the client and server are honest, that the client and server don\u2019t leak their keys, and that the cryptography is good. Which of the following attacks does TLS protect against?\n1. An attacker replaying bytes that a client sent earlier.\n2. An attacker impersonating the server.\n A. True, True\n B. False, False\n C. True, False\n D. False, True\nAnswer:", "gold": 0}, "task_name": "mmlu_computer_security:mc", "doc_id": 1, "native_id": 1, "label": 0, "requests": [{"request_type": "loglikelihood", "request": {"context": "The following are multiple choice questions (with answers) about computer security.\n\nQuestion: SHA-1 has a message digest of\n A. 160 bits\n B. 512 bits\n C. 628 bits\n D. 820 bits\nAnswer: A\n\nQuestion: _____________ can modify data on your system \u2013 so that your system doesn\u2019t run correctly or you can no longer access specific data, or it may even ask for ransom in order to give your access.\n A. IM \u2013 Trojans\n B. Backdoor Trojans\n C. Trojan-Downloader\n D. Ransom Trojan\nAnswer: D\n\nQuestion: What is ethical hacking?\n A. \"Hacking\" ethics so they justify unintended selfish behavior\n B. Hacking systems (e.g., during penetration testing) to expose vulnerabilities so they can be fixed, rather than exploited\n C. Hacking into systems run by those whose ethics you disagree with\n D. A slang term for rapid software development, e.g., as part of hackathons\nAnswer: B\n\nQuestion: Exploitation of the Heartbleed bug permits\n A. overwriting cryptographic keys in memory\n B. a kind of code injection\n C. a read outside bounds of a buffer\n D. a format string attack\nAnswer: C\n\nQuestion: The ____________ is anything which your search engine cannot search.\n A. Haunted web\n B. World Wide Web\n C. Surface web\n D. Deep Web\nAnswer: D\n\nQuestion: Assume that a TLS connection has been established successfully between a client and a server. Establishing the session included checking the server certificate and executing a DiffieHelmann exchange, but the client did not provide a client certificate. Further, assume that the client and server are honest, that the client and server don\u2019t leak their keys, and that the cryptography is good. Which of the following attacks does TLS protect against?\n1. An attacker replaying bytes that a client sent earlier.\n2. An attacker impersonating the server.\n A. True, True\n B. False, False\n C. True, False\n D. False, True\nAnswer:", "continuation": " A"}, "idx": 0}, {"request_type": "loglikelihood", "request": {"context": "The following are multiple choice questions (with answers) about computer security.\n\nQuestion: SHA-1 has a message digest of\n A. 160 bits\n B. 512 bits\n C. 628 bits\n D. 820 bits\nAnswer: A\n\nQuestion: _____________ can modify data on your system \u2013 so that your system doesn\u2019t run correctly or you can no longer access specific data, or it may even ask for ransom in order to give your access.\n A. IM \u2013 Trojans\n B. Backdoor Trojans\n C. Trojan-Downloader\n D. Ransom Trojan\nAnswer: D\n\nQuestion: What is ethical hacking?\n A. \"Hacking\" ethics so they justify unintended selfish behavior\n B. Hacking systems (e.g., during penetration testing) to expose vulnerabilities so they can be fixed, rather than exploited\n C. Hacking into systems run by those whose ethics you disagree with\n D. A slang term for rapid software development, e.g., as part of hackathons\nAnswer: B\n\nQuestion: Exploitation of the Heartbleed bug permits\n A. overwriting cryptographic keys in memory\n B. a kind of code injection\n C. a read outside bounds of a buffer\n D. a format string attack\nAnswer: C\n\nQuestion: The ____________ is anything which your search engine cannot search.\n A. Haunted web\n B. World Wide Web\n C. Surface web\n D. Deep Web\nAnswer: D\n\nQuestion: Assume that a TLS connection has been established successfully between a client and a server. Establishing the session included checking the server certificate and executing a DiffieHelmann exchange, but the client did not provide a client certificate. Further, assume that the client and server are honest, that the client and server don\u2019t leak their keys, and that the cryptography is good. Which of the following attacks does TLS protect against?\n1. An attacker replaying bytes that a client sent earlier.\n2. An attacker impersonating the server.\n A. True, True\n B. False, False\n C. True, False\n D. False, True\nAnswer:", "continuation": " B"}, "idx": 1}, {"request_type": "loglikelihood", "request": {"context": "The following are multiple choice questions (with answers) about computer security.\n\nQuestion: SHA-1 has a message digest of\n A. 160 bits\n B. 512 bits\n C. 628 bits\n D. 820 bits\nAnswer: A\n\nQuestion: _____________ can modify data on your system \u2013 so that your system doesn\u2019t run correctly or you can no longer access specific data, or it may even ask for ransom in order to give your access.\n A. IM \u2013 Trojans\n B. Backdoor Trojans\n C. Trojan-Downloader\n D. Ransom Trojan\nAnswer: D\n\nQuestion: What is ethical hacking?\n A. \"Hacking\" ethics so they justify unintended selfish behavior\n B. Hacking systems (e.g., during penetration testing) to expose vulnerabilities so they can be fixed, rather than exploited\n C. Hacking into systems run by those whose ethics you disagree with\n D. A slang term for rapid software development, e.g., as part of hackathons\nAnswer: B\n\nQuestion: Exploitation of the Heartbleed bug permits\n A. overwriting cryptographic keys in memory\n B. a kind of code injection\n C. a read outside bounds of a buffer\n D. a format string attack\nAnswer: C\n\nQuestion: The ____________ is anything which your search engine cannot search.\n A. Haunted web\n B. World Wide Web\n C. Surface web\n D. Deep Web\nAnswer: D\n\nQuestion: Assume that a TLS connection has been established successfully between a client and a server. Establishing the session included checking the server certificate and executing a DiffieHelmann exchange, but the client did not provide a client certificate. Further, assume that the client and server are honest, that the client and server don\u2019t leak their keys, and that the cryptography is good. Which of the following attacks does TLS protect against?\n1. An attacker replaying bytes that a client sent earlier.\n2. An attacker impersonating the server.\n A. True, True\n B. False, False\n C. True, False\n D. False, True\nAnswer:", "continuation": " C"}, "idx": 2}, {"request_type": "loglikelihood", "request": {"context": "The following are multiple choice questions (with answers) about computer security.\n\nQuestion: SHA-1 has a message digest of\n A. 160 bits\n B. 512 bits\n C. 628 bits\n D. 820 bits\nAnswer: A\n\nQuestion: _____________ can modify data on your system \u2013 so that your system doesn\u2019t run correctly or you can no longer access specific data, or it may even ask for ransom in order to give your access.\n A. IM \u2013 Trojans\n B. Backdoor Trojans\n C. Trojan-Downloader\n D. Ransom Trojan\nAnswer: D\n\nQuestion: What is ethical hacking?\n A. \"Hacking\" ethics so they justify unintended selfish behavior\n B. Hacking systems (e.g., during penetration testing) to expose vulnerabilities so they can be fixed, rather than exploited\n C. Hacking into systems run by those whose ethics you disagree with\n D. A slang term for rapid software development, e.g., as part of hackathons\nAnswer: B\n\nQuestion: Exploitation of the Heartbleed bug permits\n A. overwriting cryptographic keys in memory\n B. a kind of code injection\n C. a read outside bounds of a buffer\n D. a format string attack\nAnswer: C\n\nQuestion: The ____________ is anything which your search engine cannot search.\n A. Haunted web\n B. World Wide Web\n C. Surface web\n D. Deep Web\nAnswer: D\n\nQuestion: Assume that a TLS connection has been established successfully between a client and a server. Establishing the session included checking the server certificate and executing a DiffieHelmann exchange, but the client did not provide a client certificate. Further, assume that the client and server are honest, that the client and server don\u2019t leak their keys, and that the cryptography is good. Which of the following attacks does TLS protect against?\n1. An attacker replaying bytes that a client sent earlier.\n2. An attacker impersonating the server.\n A. True, True\n B. False, False\n C. True, False\n D. False, True\nAnswer:", "continuation": " D"}, "idx": 3}]} |
| {"doc": {"question": "MIT\u2019s Kerberos KDC server has a maximum ticket lifetime of 24 hours (for most user principals). What ensures that an expired Kerberos ticket can no longer be used?", "subject": "computer_security", "choices": ["A", "B", "C", "D"], "answer": 2, "index": 2, "query": "Question: MIT\u2019s Kerberos KDC server has a maximum ticket lifetime of 24 hours (for most user principals). What ensures that an expired Kerberos ticket can no longer be used?\n A. The Kerberos server (KDC) refuses to establish new connections between clients and servers for expired tickets.\n B. When a client connects to a server, the server sets a 24-hour timer to terminate the connection, which ensures a client cannot remain connected past the ticket\u2019s maximum lifetime.\n C. When a client connects to a server, the server compares the ticket\u2019s expiration time to the server\u2019s current clock, and refuses to authenticate the user if the ticket expiration time is in the past.\n D. When a client connects to a server, the server sends a query to the KDC to check if the ticket is still valid with respect to the KDC\u2019s clock, and refuses to authenticate the user if the KDC reports that the ticket is expired.\nAnswer:", "gold": 2}, "task_name": "mmlu_computer_security:mc", "doc_id": 2, "native_id": 2, "label": 2, "requests": [{"request_type": "loglikelihood", "request": {"context": "The following are multiple choice questions (with answers) about computer security.\n\nQuestion: SHA-1 has a message digest of\n A. 160 bits\n B. 512 bits\n C. 628 bits\n D. 820 bits\nAnswer: A\n\nQuestion: _____________ can modify data on your system \u2013 so that your system doesn\u2019t run correctly or you can no longer access specific data, or it may even ask for ransom in order to give your access.\n A. IM \u2013 Trojans\n B. Backdoor Trojans\n C. Trojan-Downloader\n D. Ransom Trojan\nAnswer: D\n\nQuestion: What is ethical hacking?\n A. \"Hacking\" ethics so they justify unintended selfish behavior\n B. Hacking systems (e.g., during penetration testing) to expose vulnerabilities so they can be fixed, rather than exploited\n C. Hacking into systems run by those whose ethics you disagree with\n D. A slang term for rapid software development, e.g., as part of hackathons\nAnswer: B\n\nQuestion: Exploitation of the Heartbleed bug permits\n A. overwriting cryptographic keys in memory\n B. a kind of code injection\n C. a read outside bounds of a buffer\n D. a format string attack\nAnswer: C\n\nQuestion: The ____________ is anything which your search engine cannot search.\n A. Haunted web\n B. World Wide Web\n C. Surface web\n D. Deep Web\nAnswer: D\n\nQuestion: MIT\u2019s Kerberos KDC server has a maximum ticket lifetime of 24 hours (for most user principals). What ensures that an expired Kerberos ticket can no longer be used?\n A. The Kerberos server (KDC) refuses to establish new connections between clients and servers for expired tickets.\n B. When a client connects to a server, the server sets a 24-hour timer to terminate the connection, which ensures a client cannot remain connected past the ticket\u2019s maximum lifetime.\n C. When a client connects to a server, the server compares the ticket\u2019s expiration time to the server\u2019s current clock, and refuses to authenticate the user if the ticket expiration time is in the past.\n D. When a client connects to a server, the server sends a query to the KDC to check if the ticket is still valid with respect to the KDC\u2019s clock, and refuses to authenticate the user if the KDC reports that the ticket is expired.\nAnswer:", "continuation": " A"}, "idx": 0}, {"request_type": "loglikelihood", "request": {"context": "The following are multiple choice questions (with answers) about computer security.\n\nQuestion: SHA-1 has a message digest of\n A. 160 bits\n B. 512 bits\n C. 628 bits\n D. 820 bits\nAnswer: A\n\nQuestion: _____________ can modify data on your system \u2013 so that your system doesn\u2019t run correctly or you can no longer access specific data, or it may even ask for ransom in order to give your access.\n A. IM \u2013 Trojans\n B. Backdoor Trojans\n C. Trojan-Downloader\n D. Ransom Trojan\nAnswer: D\n\nQuestion: What is ethical hacking?\n A. \"Hacking\" ethics so they justify unintended selfish behavior\n B. Hacking systems (e.g., during penetration testing) to expose vulnerabilities so they can be fixed, rather than exploited\n C. Hacking into systems run by those whose ethics you disagree with\n D. A slang term for rapid software development, e.g., as part of hackathons\nAnswer: B\n\nQuestion: Exploitation of the Heartbleed bug permits\n A. overwriting cryptographic keys in memory\n B. a kind of code injection\n C. a read outside bounds of a buffer\n D. a format string attack\nAnswer: C\n\nQuestion: The ____________ is anything which your search engine cannot search.\n A. Haunted web\n B. World Wide Web\n C. Surface web\n D. Deep Web\nAnswer: D\n\nQuestion: MIT\u2019s Kerberos KDC server has a maximum ticket lifetime of 24 hours (for most user principals). What ensures that an expired Kerberos ticket can no longer be used?\n A. The Kerberos server (KDC) refuses to establish new connections between clients and servers for expired tickets.\n B. When a client connects to a server, the server sets a 24-hour timer to terminate the connection, which ensures a client cannot remain connected past the ticket\u2019s maximum lifetime.\n C. When a client connects to a server, the server compares the ticket\u2019s expiration time to the server\u2019s current clock, and refuses to authenticate the user if the ticket expiration time is in the past.\n D. When a client connects to a server, the server sends a query to the KDC to check if the ticket is still valid with respect to the KDC\u2019s clock, and refuses to authenticate the user if the KDC reports that the ticket is expired.\nAnswer:", "continuation": " B"}, "idx": 1}, {"request_type": "loglikelihood", "request": {"context": "The following are multiple choice questions (with answers) about computer security.\n\nQuestion: SHA-1 has a message digest of\n A. 160 bits\n B. 512 bits\n C. 628 bits\n D. 820 bits\nAnswer: A\n\nQuestion: _____________ can modify data on your system \u2013 so that your system doesn\u2019t run correctly or you can no longer access specific data, or it may even ask for ransom in order to give your access.\n A. IM \u2013 Trojans\n B. Backdoor Trojans\n C. Trojan-Downloader\n D. Ransom Trojan\nAnswer: D\n\nQuestion: What is ethical hacking?\n A. \"Hacking\" ethics so they justify unintended selfish behavior\n B. Hacking systems (e.g., during penetration testing) to expose vulnerabilities so they can be fixed, rather than exploited\n C. Hacking into systems run by those whose ethics you disagree with\n D. A slang term for rapid software development, e.g., as part of hackathons\nAnswer: B\n\nQuestion: Exploitation of the Heartbleed bug permits\n A. overwriting cryptographic keys in memory\n B. a kind of code injection\n C. a read outside bounds of a buffer\n D. a format string attack\nAnswer: C\n\nQuestion: The ____________ is anything which your search engine cannot search.\n A. Haunted web\n B. World Wide Web\n C. Surface web\n D. Deep Web\nAnswer: D\n\nQuestion: MIT\u2019s Kerberos KDC server has a maximum ticket lifetime of 24 hours (for most user principals). What ensures that an expired Kerberos ticket can no longer be used?\n A. The Kerberos server (KDC) refuses to establish new connections between clients and servers for expired tickets.\n B. When a client connects to a server, the server sets a 24-hour timer to terminate the connection, which ensures a client cannot remain connected past the ticket\u2019s maximum lifetime.\n C. When a client connects to a server, the server compares the ticket\u2019s expiration time to the server\u2019s current clock, and refuses to authenticate the user if the ticket expiration time is in the past.\n D. When a client connects to a server, the server sends a query to the KDC to check if the ticket is still valid with respect to the KDC\u2019s clock, and refuses to authenticate the user if the KDC reports that the ticket is expired.\nAnswer:", "continuation": " C"}, "idx": 2}, {"request_type": "loglikelihood", "request": {"context": "The following are multiple choice questions (with answers) about computer security.\n\nQuestion: SHA-1 has a message digest of\n A. 160 bits\n B. 512 bits\n C. 628 bits\n D. 820 bits\nAnswer: A\n\nQuestion: _____________ can modify data on your system \u2013 so that your system doesn\u2019t run correctly or you can no longer access specific data, or it may even ask for ransom in order to give your access.\n A. IM \u2013 Trojans\n B. Backdoor Trojans\n C. Trojan-Downloader\n D. Ransom Trojan\nAnswer: D\n\nQuestion: What is ethical hacking?\n A. \"Hacking\" ethics so they justify unintended selfish behavior\n B. Hacking systems (e.g., during penetration testing) to expose vulnerabilities so they can be fixed, rather than exploited\n C. Hacking into systems run by those whose ethics you disagree with\n D. A slang term for rapid software development, e.g., as part of hackathons\nAnswer: B\n\nQuestion: Exploitation of the Heartbleed bug permits\n A. overwriting cryptographic keys in memory\n B. a kind of code injection\n C. a read outside bounds of a buffer\n D. a format string attack\nAnswer: C\n\nQuestion: The ____________ is anything which your search engine cannot search.\n A. Haunted web\n B. World Wide Web\n C. Surface web\n D. Deep Web\nAnswer: D\n\nQuestion: MIT\u2019s Kerberos KDC server has a maximum ticket lifetime of 24 hours (for most user principals). What ensures that an expired Kerberos ticket can no longer be used?\n A. The Kerberos server (KDC) refuses to establish new connections between clients and servers for expired tickets.\n B. When a client connects to a server, the server sets a 24-hour timer to terminate the connection, which ensures a client cannot remain connected past the ticket\u2019s maximum lifetime.\n C. When a client connects to a server, the server compares the ticket\u2019s expiration time to the server\u2019s current clock, and refuses to authenticate the user if the ticket expiration time is in the past.\n D. When a client connects to a server, the server sends a query to the KDC to check if the ticket is still valid with respect to the KDC\u2019s clock, and refuses to authenticate the user if the KDC reports that the ticket is expired.\nAnswer:", "continuation": " D"}, "idx": 3}]} |
|
|