Kerberos relies exclusively on __________ .
A. symmetric encryption
B. asymmetric encryption
C. private key encryption
D. public key encryption
A. symmetric encryption
Computer Science & Information Technology
You might also like to view...
A(n) ____________________ marks a location in a document so that you can quickly move the insertion point to that location.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
What is Visual Basic for Applications (VBA)?
A. programming language B. programming module C. macro test code D. macro recorder
Computer Science & Information Technology