Kerberos uses which of the following in its operations?

A. assertions
B. tickets
C. EAP messages
D. security provisions

B
Explanation: Kerberos authenticates users through the use of tickets.

Computer Science & Information Technology

You might also like to view...

A relationship between tables in which a record in one table has only one matching record in the second table is a ________

A) 1:N B) M:N C) 1:1 D) There would not be a relationship between the two tables.

Computer Science & Information Technology

The ________ pointer can be used to create a custom table on a slide

A) Paint B) Eyedropper C) Table D) Draw

Computer Science & Information Technology