A security administrator has installed a new KDC for the corporate environment. Which of
the following authentication protocols is the security administrator planning to implement
across the organization?

A.
LDAP
B.
RADIUS
C.
Kerberos
D.
XTACACS