Kerberos uses which of the following in its operations?
A. assertions
B. tickets
C. EAP messages
D. security provisions
B
Explanation: Kerberos authenticates users through the use of tickets.
Computer Science & Information Technology
You might also like to view...
Which of the following belongs to a specific method?
a. Local variable b. Parameter variable c. Class-Level variable d. World-Level variable e. None of these
Computer Science & Information Technology
You CANNOT retrieve a lost SkyDrive password
Indicate whether the statement is true or false
Computer Science & Information Technology
All duplicated data represents poor database design.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
A network server requires at least three connections to the network in the form of a network interface card.?
Answer the following statement true (T) or false (F)
Computer Science & Information Technology