ISC Exam Questions

what encryption method?

Kerberos depends upon what encryption method?

A.
Public Key cryptography

B.
Private Key cryptography

C.
El Gamal cryptography

D.
Blowfish cryptography

Explanation:
Kerberos uses symmetric key cryptography and provides end-to-end security, meaning that
information being passed between a user and a service is protected without the need of an
intermediate component. Although it allows the use of passwords for authentication, it was
designed specifically to eliminate the need for transmitting passwords over the network. Most
Kerberos implementations work with cryptography keys and shared secret keys (private keys)
instead of passwords. Pg 148 Shon Harris All-In-One CISSP Certification Exam Guide