Kerberos, at its simplest, is an authentication protocol for client/server applications. It's designed to provide secure authentication over an insecure network.
keyword:provides user-to-server authentication.
kerberos - authentication was provided from AS to user. not user to server.
B - user provide its user name &psw to server first as authentication.
Here's how user-based authorization typically works:
Authentication: Before a user can be authorized, they must first authenticate themselves to the system. Authentication verifies the user's identity through credentials such as usernames, passwords, biometric information, or digital certificates.
Authorization: Once authenticated, the system determines what actions the user is allowed to perform based on their identity. This is where user-based authorization comes into play. Access rights and permissions are typically defined in an access control list (ACL) or a similar mechanism, which associates users or user groups with specific permissions.
so.chose B
C. Kerberos
Kerberos is a network authentication protocol that provides strong authentication for client-server applications by using secret-key cryptography. It allows users and servers to authenticate each other's identities, ensuring that clients are communicating with legitimate servers and vice versa.
C- Answer
A client server infrastructure that provides user-to-server authentication describes Kerberos. Kerberos is a network authentication protocol that uses secret-key cryptography to provide authentication for client/server applications by using tickets. These tickets are used to prove the identity of a user or host, allowing for secure communication over a non-secure network. Kerberos is a widely-used standard for user-to-server authentication in enterprise environments.
Kerberos was developed at MIT, and named for the three-headed guard dog owned by Hades in Greek mythology. It was designed to provide mutual authentication and encryption for secure communication between clients and servers on a non-secure network.
It's C for sure:
https://csrc.nist.gov/glossary/term/kerberos
A network authentication protocol that is designed to provide strong authentication for client/server applications by using symmetric-key cryptography.
Source(s):
NIST SP 800-57 Part 2 Rev.1
given is correct. the rest provide mutual authentication
upvoted 7 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
CuteRabbit168
Highly Voted 2 years, 2 months agojackdryan
1 year, 6 months agojon1991
Highly Voted 2 years, 2 months agoHongjun
Most Recent 8 months agoSoleandheel
11 months, 2 weeks agoDee83
1 year, 10 months agoDelab202
1 year, 11 months agoPeepoK
1 year, 11 months agoSF_NERD
2 years, 1 month agobrb77
2 years, 1 month ago