1What is a suppress-replay attack?
2What problem was Kerberos designed to address?
3What are three threats associated with user authentication over a network or Internet?
4List three approaches to secure user authentication in a distributed environment.
5What four requirements were defined for Kerberos?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here