Kerberos uses which of the following in its operations?

A. assertions
B. tickets
C. EAP messages
D. security provisions


B
Explanation: Kerberos authenticates users through the use of tickets.

Computer Science & Information Technology

You might also like to view...

Which of the following belongs to a specific method?

a. Local variable b. Parameter variable c. Class-Level variable d. World-Level variable e. None of these

Computer Science & Information Technology

You CANNOT retrieve a lost SkyDrive password

Indicate whether the statement is true or false

Computer Science & Information Technology

All duplicated data represents poor database design.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A network server requires at least three connections to the network in the form of a network interface card.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology