Your organization is using Kerberos for private network authentication. How does Kerberos demonstrate to a resource host that the identity of a user is valid?

A. A shared credential is issued to each principle in the realm.
B. A unique session key is used to encrypt the authentication communications.
C. A TGT is issued to the resource host.
D. An ST is issued to the user, which is then sent to the resource host.

Answer: D. An ST is issued to the user, which is then sent to the resource host.

Computer Science & Information Technology

You might also like to view...

Theorists argue that terrorism may be characterized as theater in which the audience is far more important than the actors

Indicate whether the statement is true or false.

Computer Science & Information Technology

The Secure Hash Algorithm (SHA) was developed by the _________ and published as a federal information processing standard (FIPS 180) in 1993.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology