Defending against attacks: Simulation and working of Kerberos protocol for mutual authentication

Which of the following statements is TRUE about the Kerberos protocol?
Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Which of the following is NOT a component of the Kerberos protocol?
Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

In Kerberos, what does the client send to the Key Distribution Center to access a certain resource?
Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation