Kerberos uses which of the following in its operations?
A. assertions
B. tickets
C. EAP messages
D. security provisions
B
Explanation: Kerberos authenticates users through the use of tickets.
Computer Science & Information Technology
You might also like to view...
A relationship between tables in which a record in one table has only one matching record in the second table is a ________
A) 1:N B) M:N C) 1:1 D) There would not be a relationship between the two tables.
Computer Science & Information Technology
The ________ pointer can be used to create a custom table on a slide
A) Paint B) Eyedropper C) Table D) Draw
Computer Science & Information Technology