Explain Kerberos Protocol ?
Answers were Sorted based on User's Feedback
Answer / pervez rauf khan balrampuri
It is an authentication service developed at Massachusetts
institute of technology.Kerberos uses encryption to prevent
intruders from discovering passwords and gaining
unauthorized access to files.
Is This Answer Correct ? | 5 Yes | 3 No |
Answer / manju,amarjit,parminder,raj,si
kerberos was developed at Massachusets Institute of
Technology.kerberos uses a Kerberos Domain Controller
(kdc).the kerberos ticket is proof that the client has
permission to access the resource.
Is This Answer Correct ? | 1 Yes | 1 No |
Explain why is a gateway used?
what is the ethernet interface?where and when we can use? how to connect hte host systems to target system
Suppose in DHCP server running network(assigning ip addresses automatically), you connect a Laptop in the same n/w, now how the DHCP is going to assign a IP add. to it and how it will came to know that there's one new machine added.
13 Answers Cisco, CybAge, Mphasis, Targus Technologies, Zensoft,
How to place an interface into trunking mode?
What are protocols? What are they used for?
what is ping of death ?
What is difference b/w static ip address and dynamic ip address
With the aid of a diagram explain how CSMA/CD is implemented in a 10BASE T hub network. Why is Ethernet mostly used as a 'best effort' datagram service?
1 Answers Sri Lanka Institute of Information Technology (SLIIT), Virtusa,
A periodic composite signal with a bandwidth of 3000 Hz,is composed of two sine waves. First one has a frequency of 100 Hz with a maximum amplitude of 30 V, the second one has a maximum amplitude of 10 V. Draw the bandwidth.
Expand PDF
what are the service primitives present in cn?
where do we use the wild card masking in the routing protocols?