Which of the following is true about Kerberos?

A.
It utilized public key cryptography
B.
It encrypts data after a ticket is granted, but passwords are exchanged in plain text
C.
It depends upon symmetric ciphers
D.
It is a second party authentication system
Explanation:
“Kerberos relies upon symmetric key cryptography, specifically Data Encryption
Standard (DES), and provides end-to-end security for authentication traffic between the client and
the Key Distribution Center (KDC).” Pg. 15 Tittel: CISSP Study Guide