Kerberos relies exclusively on __________ .

A. symmetric encryption
B. asymmetric encryption
C. private key encryption
D. public key encryption

A. symmetric encryption

Computer Science & Information Technology

You might also like to view...

A(n) ____________________ marks a location in a document so that you can quickly move the insertion point to that location.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What is Visual Basic for Applications (VBA)?

A. programming language B. programming module C. macro test code D. macro recorder

Computer Science & Information Technology