FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF NETWORK SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following authentication systems makes use of a KeyDistribution Center?
A
Secutiry tokens
B
CHAP
C
Kerberos
D
Certificates
Explanation: 

Detailed explanation-1: -Explanation. Kerberos authentication uses a Key Distribution Center (KDC) to orchestrate the process. The KDC authenticates the principal (which can be a user, program, or system) and provides it with a ticket.

Detailed explanation-2: -Kerberos uses symmetric key cryptography and requires trusted third-party authorization to verify user identities.

Detailed explanation-3: -Kerberos runs as a third-party trusted server known as the Key Distribution Center (KDC). Each user and service on the network is a principal. The KDC has three main components: An authentication server that performs the initial authentication and issues ticket-granting tickets for users.

Detailed explanation-4: -The three heads of the Kerberos protocol represent the following: the client or principal; the network resource, which is the application server that provides access to the network resource; and. a key distribution center (KDC), which acts as Kerberos’ trusted third-party authentication service.

Detailed explanation-5: -The process of authenticating using Kerberos involves three systems: a client, a network resource, and the Kerberos server. The Kerberos server is called the Key Distribution Center (KDC). The KDC has two functions: an Authentication Service (AS) and a Ticket Granting Service (TGS).

There is 1 question to complete.