COMPUTER ETHICS AND SECURITY
CRYPTOGRAPHY AND ENCRYPTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Secutiry tokens
|
|
CHAP
|
|
Kerberos
|
|
Certificates
|
Detailed explanation-1: -Kerberos is an authentication protocol that enables computers to prove their identity to each other in a secure manner; it is quite often used in a client/server environment such as a Microsoft domain. Kerberos is the only answer listed that uses a Key Distribution Center.
Detailed explanation-2: -Kerberos authentication uses a Key Distribution Center (KDC) to orchestrate the process. The KDC authenticates the principal (which can be a user, program, or system) and provides it with a ticket. After this ticket is issued, it can be used to authenticate against other principals.
Detailed explanation-3: -The key components in a Kerberos system are the Key Distribution Center (KDC), the Authentication Service, and the Ticket Granting Service. Key Distribution Center-KDC is the center of the Kerberos process.
Detailed explanation-4: -Which of the following authentication method can use location to authenticate a user? Attribute-based access control (ABAC) works on attributes instead of users or groups. For example, city and department could be two attributes of users. If both the attributes match, the user is granted access to the object.
Detailed explanation-5: -In the Kerberos process, a Ticket Granting Ticket (TGT) is used to request access to services. It is an encrypted token that contains information about the user, such as their identity and the services they are authorized to access.