Kerberos uses symmetric-key ____ to verify the identity of a client to a server and a server to a client.

A. cryptology
B. synchronization
C. authentication
D. masking


Answer: A

Computer Science & Information Technology

You might also like to view...

What is a Berkeley broadcast address?

What will be an ideal response?

Computer Science & Information Technology

Each hardware device must have its own ____ so that the operating system can detect it.

A. name B. process C. driver D. daemon

Computer Science & Information Technology

Match the result with the function using the following numbers, 21, 42, 97, 1, 14, 199 [to two decimal places]:

I. 31.50 II. 62.33 III. 1 IV. 6 V. 199 A. MIN B. MEDIAN C. MAX D. COUNT E. AVERAGE

Computer Science & Information Technology

After a function is declared as virtual, it remains virtual for the next derived class, with or without a virtual declaration in the derived class.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology