COMPUTER NETWORKING

NETWORK SECURITY

INTRODUCTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following authentication systems makes use of a KeyDistribution Center?
A
Secutiry tokens
B
CHAP
C
Kerberos
D
Certificates
Explanation: 

Detailed explanation-1: -Kerberos is an authentication protocol that enables computers to prove their identity to each other in a secure manner; it is quite often used in a client/server environment such as a Microsoft domain. Kerberos is the only answer listed that uses a Key Distribution Center.

Detailed explanation-2: -Kerberos authentication uses a Key Distribution Center (KDC) to orchestrate the process. The KDC authenticates the principal (which can be a user, program, or system) and provides it with a ticket. After this ticket is issued, it can be used to authenticate against other principals.

Detailed explanation-3: -Kerberos uses symmetric key cryptography and a key distribution center (KDC) to authenticate and verify user identities. A KDC involves three aspects: A ticket-granting server (TGS) that connects the user with the service server (SS)

Detailed explanation-4: -The key components in a Kerberos system are the Key Distribution Center (KDC), the Authentication Service, and the Ticket Granting Service. Key Distribution Center-KDC is the center of the Kerberos process.

Detailed explanation-5: -Which of the following authentication method can use location to authenticate a user? Attribute-based access control (ABAC) works on attributes instead of users or groups. For example, city and department could be two attributes of users. If both the attributes match, the user is granted access to the object.

There is 1 question to complete.