A security administrator has installed a new KDC for the corporate environment. Which of the
following authentication protocols is the security administrator planning to implement across the
organization?

A.
LDAP
B.
RADIUS
C.
Kerberos
D.
XTACACS
You must be logged in to post a comment.
Kerberos authentication uses a key distribution center(KDC)
0
0