The Key Distribution Center (KDC) is a central part of the Kerberos authentication system. How should the system running the KDC be configured?

A.
It should be a hardened, minimized system.
B.
It should be a hardened, non-networked system.
C.
The KDC implementation employs cryptography and can therefore run securely on an ordinary multi-user system.
D.
For improved security, users must log in to the KDC before authenticating themselves, so it must be a multi-user system.