An organization uses a Kerberos-based LDAP service for network authentication. The service is also utilized for
internal web applications. Finally access to terminal applications is achieved using the same authentication
method by joining the legacy system to the Kerberos realm. This company is using Kerberos to achieve which
of the following?
Trusted Operating System
Rule-based access control
Single sign on
Mandatory access control