Explain Kerberos Protocol ?
Answers were Sorted based on User's Feedback
Answer / pervez rauf khan balrampuri
It is an authentication service developed at Massachusetts
institute of technology.Kerberos uses encryption to prevent
intruders from discovering passwords and gaining
unauthorized access to files.
Is This Answer Correct ? | 5 Yes | 3 No |
Answer / manju,amarjit,parminder,raj,si
kerberos was developed at Massachusets Institute of
Technology.kerberos uses a Kerberos Domain Controller
(kdc).the kerberos ticket is proof that the client has
permission to access the resource.
Is This Answer Correct ? | 1 Yes | 1 No |
what is ping of death ?
If all stations tries to communicate at same time, what will happen ?
What is SPAN or RSPAN?
Suppose in DHCP server running network(assigning ip addresses automatically), you connect a Laptop in the same n/w, now how the DHCP is going to assign a IP add. to it and how it will came to know that there's one new machine added.
13 Answers Cisco, CybAge, Mphasis, Targus Technologies, Zensoft,
What is a wildcard mask, and how is it different from a netmask?
How does FDDI node determine whether it can send asynchronous traffic and synchronous traffic
What is a default gateway?
With the aid of a diagram explain how CSMA/CD is implemented in a 10BASE T hub network. Why is Ethernet mostly used as a 'best effort' datagram service?
1 Answers Sri Lanka Institute of Information Technology (SLIIT), Virtusa,
Expand DSL
Give the name of protocol that is used by DNS name servers?
What is difference b/w static ip address and dynamic ip address
What LAN analyzer tools are you familiar with and describe how you use them to troubleshoot and on what media and network types.