Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What is Kerberos?

Answers were Sorted based on User's Feedback



What is Kerberos?..

Answer / anil

Kerberos is a network authentication protocol. It is
designed to provide strong authentication for client/server
applications by using secret-key cryptography.

Is This Answer Correct ?    9 Yes 1 No

What is Kerberos?..

Answer / r.raja ramesh

Kerberos is a network authentication protocol which
utilizes symmetric cryptography to provide authentication
for client-server applications.

Is This Answer Correct ?    4 Yes 1 No

What is Kerberos?..

Answer / madan kumar pc

Kerberos is also called as a third party authentication who
generate keys for transmission of messages

Is This Answer Correct ?    2 Yes 0 No

Post New Answer

More Networking AllOther Interview Questions

What Equipment Do I Need for My VSAT Network?

0 Answers   Hughes,


Give two reasons why PGP compresses messages.

1 Answers  


what happens when two consigitive ports of switch are connacted using one cross cabel with each other?(how the whole network gets down)

0 Answers  


Why networks are layered ?

4 Answers   Honeywell,


Domain user can have multiple login password true or false

4 Answers  


Where is the special IP address 127.0.0.0. used ?

1 Answers  


x.25 protocol encapsulates the follwing layers a)network b)datalink c)physical d)all of the above e)none of the above

4 Answers   Infosys, Siemens,


How many types of backups in windows2003

10 Answers   Progression, Siemens,


What are the two types of transmission technology available

0 Answers   Elgi Equipments,


What is Norton Ghost? How do i create a bootable disc?

1 Answers  


FILESYSTEM scenario. A volume is filling up and almost out of space. How do you determine what is using up your available filesystem space?

0 Answers  


Write two ways in which computer applications differ from network applications ?

0 Answers  


Categories
  • Networking Protocols Interview Questions Networking Protocols (671)
  • Networking Administration Interview Questions Networking Administration (1008)
  • Networking Security Interview Questions Networking Security (196)
  • Networking General Interview Questions Networking General (266)
  • Networking AllOther Interview Questions Networking AllOther (430)