Answer the following statements true (T) or false (F)
1. The approach taken by Kerberos is using authentication software tied
to a secure authentication server.
2. The overall scheme of Kerberos is that of a trusted third-party
authentication service.
3. Kerberos is designed to counter only one specific threat to the security
of a client/server dialogue.
4. An obvious security risk is that of impersonation.
5. The authentication server shares a unique secret key with each server.
1. True
2. True
3. False
4, True
5. True
You might also like to view...
Use bookmarks to locate a specific part of document quickly
Indicate whether the statement is true or false
Which Amazon service can I use to define a virtual network that closely resembles a traditional data center?
A. Amazon VPC B. Amazon ServiceBus C. Amazon EMR D. Amazon RDS