Kerberos depends upon what encryption method?

A.
Public Key cryptography
B.
Private Key cryptography
C.
El Gamal cryptography
D.
Blowfish cryptography
Explanation:
Kerberos uses symmetric key cryptography and provides end-to-end security,
meaning that information being passed between a user and a service is protected without the
need of an intermediate component. Although it allows the use of passwords for authentication, it
was designed specifically to eliminate the need for transmitting passwords over the network. MostKerberos implementations work with cryptography keys and shared secret keys (private keys)
instead of passwords. Pg 148 Shon Harris All-In-One CISSP Certification Exam Guide
check
0
0