COMPUTER NETWORKING

NETWORK SECURITY

INTRODUCTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
What is the most secure method of authentication and authorization in its default form?
A
TACACS
B
Kerberos
C
RADIUS
D
LDAP
Explanation: 

Detailed explanation-1: -CAC cards are smart cards that are used for ID and authentication to systems. What is the most secure method of authentication and authorization in its default form? Kerberos is the most secure method of authentication listed.

Detailed explanation-2: -Cryptography, multiple secret keys, and third-party authorization make Kerberos one of the industry’s most secure verification protocols.

Detailed explanation-3: -Initially developed by the Massachusetts Institute of Technology (MIT) for Project Athena in the late ‘80s, Kerberos is now the default authorization technology used by Microsoft Windows. Kerberos implementations also exist for other operating systems such as Apple OS, FreeBSD, UNIX, and Linux.

Detailed explanation-4: -One-Time Password (OTP) An OTP and its sibling, time-based one-time passwords (TOTP), are unique temporary passwords. Biometrics Authentication. If there’s one thing that you always have with you, it’s your body. Continuous Authentication. The Three Factors of Authentication. 20-Jun-2022

There is 1 question to complete.