Answer Posted / pervez rauf khan balrampuri
It is an authentication service developed at Massachusetts
institute of technology.Kerberos uses encryption to prevent
intruders from discovering passwords and gaining
unauthorized access to files.
| Is This Answer Correct ? | 5 Yes | 3 No |
Post New Answer View All Answers
How to confiner single router two services provided. Both service provided are same Speed
What LAN analyzer tools are you familiar with and describe how you use them to troubleshoot and on what media and network types.
What does ftp stand for?
What ftp means?
What are protocols? What are they used for?
How do I transfer files using ftp?
A periodic composite signal with a bandwidth of 3000 Hz,is composed of two sine waves. First one has a frequency of 100 Hz with a maximum amplitude of 30 V, the second one has a maximum amplitude of 10 V. Draw the bandwidth.
What are protocols?
How do you make a website HTTPS?
What is the difference between Cognos Reportnet features and Business Objects???
Where i can get the objective type question for Voip. please let me know soon.
How we can communicate (voice communication) in LAN by using core java?
Can you tell what do we mean by http protocol?
What are the generally asked questions for a Person who is attending Network protocol testing L2/L3.
Explain Protocols?