Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Kerberos is a protocol used for ___________.
Home
Web Services Security
Kerberos is a protocol used for ___________.
0
votes
asked
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
Kerberos is a protocol used for ___________.
a)Encryption
b)Authentication
c)Authorization
kerberos-protocol
web-security-protocol
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
Mar 7, 2022
by
rajeshsharma
b)Authentication
Kerberos is a protocol used for Authentication.
Related questions
0
votes
Q: The Web services protocol for creating and sharing security context:
asked
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
web-service-protocol
+1
vote
Q: ___________ protocol is used for SAP Fiori factsheet search.
asked
Mar 4, 2023
in
SAP
by
GeorgeBell
sap-s4hana-interview-questions-answers
0
votes
Q: HTTP, FTP, SMTP are included in which layer of the Web service protocol stack?
asked
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
http
ftp
smtp
0
votes
Q: HTTP is an _________ layer protocol.
asked
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
http-layer-protocol
web-security
0
votes
Q: Kerberos was developed at ___________.
asked
May 10, 2022
in
Kerberos
by
sharadyadav1986
kerberos
0
votes
Q: To exchange information between computers, requests are encoded in ________ and sent via ___________.
asked
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
web-service-security
information-encoding
0
votes
Q: Which of the following method is used to hash a user’s password+salt in Kerberos?
asked
May 10, 2022
in
Kerberos
by
sharadyadav1986
hash
kerbores
+1
vote
Q: Transmission Control Protocol Internet Networking Protocol have ___________
asked
Dec 30, 2021
in
Wireless Mobile
by
GeorgeBell
wireless-mobile
0
votes
Q: Strong authentication schemes along with message time stamp and sequence numbering can be used as a countermeasure against ________________.
asked
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
time-stamp
authentication
0
votes
Q: Signing and encrypting messages are used to ensure:
asked
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
signing
encyption
...