Answer the following statements true (T) or false (F)

1. The approach taken by Kerberos is using authentication software tied
to a secure authentication server.
2. The overall scheme of Kerberos is that of a trusted third-party
authentication service.
3. Kerberos is designed to counter only one specific threat to the security
of a client/server dialogue.
4. An obvious security risk is that of impersonation.
5. The authentication server shares a unique secret key with each server.


1. True
2. True
3. False
4, True
5. True

Computer Science & Information Technology

You might also like to view...

Use bookmarks to locate a specific part of document quickly

Indicate whether the statement is true or false

Computer Science & Information Technology

Which Amazon service can I use to define a virtual network that closely resembles a traditional data center?

A. Amazon VPC B. Amazon ServiceBus C. Amazon EMR D. Amazon RDS

Computer Science & Information Technology