Which of the following is true about Kerberos?

A.
It utilizes public key cryptography
B.
It encrypts data after a ticket is granted, but passwords are exchanged in plain text.
C.
It depends upon symmetric ciphers
D.
It is a second party authentication system