An organization uses a Kerberos-based LDAP service for network authentication. The service is also utilized for internal web applications. Finally access to terminal applications is achieved using the same authentication method by joining the legacy system to the Kerberos realm. This company is using Kerberos to achieve which of the following?
A. Trusted Operating System
B. Rule-based access control
C. Single sign on
D. Mandatory access control
Answer: C. Single sign on
Computer Science & Information Technology
You might also like to view...
Which of the following operators can not be overloaded?
a. = b. == c. . d. []
Computer Science & Information Technology
Podcast readers automatically check for new content and download it to your computer.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology