Explain Kerberos Protocol ?

Answers were Sorted based on User's Feedback



Explain Kerberos Protocol ?..

Answer / pervez rauf khan balrampuri

It is an authentication service developed at Massachusetts
institute of technology.Kerberos uses encryption to prevent
intruders from discovering passwords and gaining
unauthorized access to files.

Is This Answer Correct ?    5 Yes 3 No

Explain Kerberos Protocol ?..

Answer / vijay

It is windows authentication protocal

Is This Answer Correct ?    4 Yes 2 No

Explain Kerberos Protocol ?..

Answer / manju,amarjit,parminder,raj,si

kerberos was developed at Massachusets Institute of
Technology.kerberos uses a Kerberos Domain Controller
(kdc).the kerberos ticket is proof that the client has
permission to access the resource.

Is This Answer Correct ?    1 Yes 1 No

Post New Answer

More Protocols AllOther Interview Questions

Explain why is a gateway used?

0 Answers   BPL,


what is the ethernet interface?where and when we can use? how to connect hte host systems to target system

1 Answers   Sasken,


Suppose in DHCP server running network(assigning ip addresses automatically), you connect a Laptop in the same n/w, now how the DHCP is going to assign a IP add. to it and how it will came to know that there's one new machine added.

13 Answers   Cisco, CybAge, Mphasis, Targus Technologies, Zensoft,


How to place an interface into trunking mode?

1 Answers   Cisco,


What are protocols? What are they used for?

0 Answers  






what is ping of death ?

3 Answers  


What is difference b/w static ip address and dynamic ip address

9 Answers   HCL, TCS,


With the aid of a diagram explain how CSMA/CD is implemented in a 10BASE T hub network. Why is Ethernet mostly used as a 'best effort' datagram service?

1 Answers   Sri Lanka Institute of Information Technology (SLIIT), Virtusa,


A periodic composite signal with a bandwidth of 3000 Hz,is composed of two sine waves. First one has a frequency of 100 Hz with a maximum amplitude of 30 V, the second one has a maximum amplitude of 10 V. Draw the bandwidth.

0 Answers  


Expand PDF

4 Answers  


what are the service primitives present in cn?

1 Answers   Assurgent,


where do we use the wild card masking in the routing protocols?

2 Answers   SAIC,


Categories