which of the following?
In Kerberos, the Ticket Granting Ticket (TGT) is used for which of the following?
Which of the following types of authentication packages user credentials in a ticket?
Which of the following types of authentication packages user credentials in a ticket?
Which of the following authentication services requires the use of a ticket-granting ticket (TGT) server in or
Which of the following authentication services requires the use of a ticket-granting ticket (TGT) server in
order to complete the authentication process?
Which of the following authentication protocols is the security administrator planning to implement across the
A security administrator has installed a new KDC for the corporate environment. Which of the following
authentication protocols is the security administrator planning to implement across the organization?
Which of the following solutions BEST relates to the host authentication protocol within the company’s envir
Jane, a security administrator, has been tasked with explaining authentication services to the company’s
management team. The company runs an active directory infrastructure. Which of the following solutions
BEST relates to the host authentication protocol within the company’s environment?
Which of the following types of authentication solutions use tickets to provide access to various resources fr
Which of the following types of authentication solutions use tickets to provide access to various resources
from a central location?
Which of the following authentication services uses a ticket granting system to provide access?
Which of the following authentication services uses a ticket granting system to provide access?
Which of the following authentication services would this use this port by default?
An information bank has been established to store contacts, phone numbers and other records.
An application running on UNIX would like to connect to this index server using port 88. Which of the
following authentication services would this use this port by default?
Which of the following was based on a previous X.500 specification and allows either unencrypted authenticatio
Which of the following was based on a previous X.500 specification and allows either unencrypted
authentication or encrypted authentication through the use of TLS?
Which of the following authentication services is being used?
A system administrator is configuring UNIX accounts to authenticate against an external server. The
configuration file asks for the following information DC=ServerName and DC=COM. Which of the
following authentication services is being used?