Answer Posted / pervez rauf khan balrampuri
It is an authentication service developed at Massachusetts
institute of technology.Kerberos uses encryption to prevent
intruders from discovering passwords and gaining
unauthorized access to files.
Is This Answer Correct ? | 5 Yes | 3 No |
Post New Answer View All Answers
What are protocols? What are they used for?
What is HTTP and can you list few protocols with explanations?
Where i can get the objective type question for Voip. please let me know soon.
What is protocol extension?
What are the uses of protocols?
In UDP protocal Iam sending one immage i lost one packet in network how can i refill that packet on receving side,how can i deside total immage is receved ?
How do you make a website HTTPS?
What are the generally asked questions for a Person who is attending Network protocol testing L2/L3.
Give the name of protocol that is used by DNS name servers?
How do I ftp?
What ftp means?
How does FDDI node determine whether it can send asynchronous traffic and synchronous traffic
What is the difference between Cognos Reportnet features and Business Objects???
What is the difference between http and https?
Hi Guys, Can some please tell me which is the best institute for network protocol (l2 l3 l4 ) stack development in Noida.