Kerberos uses symmetric-key ____ to verify the identity of a client to a server and a server to a client.
A. cryptology
B. synchronization
C. authentication
D. masking
Answer: A
Computer Science & Information Technology
You might also like to view...
What is a Berkeley broadcast address?
What will be an ideal response?
Computer Science & Information Technology
Each hardware device must have its own ____ so that the operating system can detect it.
A. name B. process C. driver D. daemon
Computer Science & Information Technology
Match the result with the function using the following numbers, 21, 42, 97, 1, 14, 199 [to two decimal places]:
I. 31.50 II. 62.33 III. 1 IV. 6 V. 199 A. MIN B. MEDIAN C. MAX D. COUNT E. AVERAGE
Computer Science & Information Technology
After a function is declared as virtual, it remains virtual for the next derived class, with or without a virtual declaration in the derived class.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology