Kerberos security and authentication are based on

This preview shows page 2 - 5 out of 5 pages.

We have textbook solutions for you!
The document you are viewing contains questions related to this textbook.
Guide to Operating System
The document you are viewing contains questions related to this textbook.
Chapter 2 / Exercise 4
Guide to Operating System
Tomsho
Expert Verified
10. Kerberos security and authentication are based on what type of technology?Page 385a. challenge-responseb. secret keyc. legacy coded. secure transmission
We have textbook solutions for you!
The document you are viewing contains questions related to this textbook.
Guide to Operating System
The document you are viewing contains questions related to this textbook.
Chapter 2 / Exercise 4
Guide to Operating System
Tomsho
Expert Verified
Answer: ___B__
11. Which Kerberos setting defines the maximum lifetime of a Kerberos ticket?Page 385
12. What is the default maximum allowable time lapse between domain controllers and client systems for Kerberos to work correctly?Page 386
13. What does the acronym NTLM stand for?Page 384
14. What is the default authentication protocol for contemporary domaincomputers?Page 384a. Kerberosb. NTLMc. PAPd. CHAPAnswer: ___A__
15. Identify another utility that you can use to add SPNs to an account.Page 387
16. Which Kerberos setting defines the maximum time skew that can be tolerated between a ticket’s timestamp and the current time at the KDC?Page 386

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture