Defending against attacks: Simulation and working of Kerberos protocol for mutual authentication

Which of the following statements is TRUE about the Kerberos protocol?
Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Which of the following is NOT a component of the Kerberos protocol?
Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

In Kerberos, the client sends a to the key distribution centre to access a certain resource.
Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation