CoolInterview.com - World's Largest Collection of Interview Questions & Answers, FAQs, queries, sample papers, exam papers, dumps, what, why, how, where, when questions
Our Services
Get 9,000 Interview Questions & Answers in an eBook.




Get it now !!
Send your Resume to 6000 Companies

Search Interview Questions

Question: What is the use of kerberos protocol ?

Answer: Kerberos is a system of authentication developed at MIT as part of the Athena project. Kerberos uses encryption technology and a trusted third party, an arbitrator, to perform secure authentication on an open network. Specifically, Kerberos uses cryptographic tickets in order to avoid transmitting plain text passwords over the wire. Kerberos was based upon the Needham-Schroeder protocol.



Category Networking Interview Questions & Answers - Exam Mode / Learning Mode
Rating (3.1) By 35 users
Added on 8/3/2013
Views 1036
Rate it!
Question: What is the use of kerberos protocol ?
Answer:

Kerberos is a system of authentication developed at MIT as part of the Athena project. Kerberos uses encryption technology and a trusted third party, an arbitrator, to perform secure authentication on an open network. Specifically, Kerberos uses cryptographic tickets in order to avoid transmitting plain text passwords over the wire. Kerberos was based upon the Needham-Schroeder protocol. Source: CoolInterview.com

Answered by: Bijoy K | Date: 8/5/2008 | Contact Bijoy K Contact Bijoy K

Kerberos is an authentication protocol which is used at the time of the user login.

The authentication is done in the Domain Controller where the user account is present.

In the other words "It is a request from the user to the DC to provide the services of the their own private and also inter network. Source: CoolInterview.com

Answered by: Md Ishaq Asif | Date: 2/21/2009 | Contact Md Ishaq Asif Contact Md Ishaq Asif

In a simple way Kerberose is the protocol which is used to communicate client to server and vice versa in secure way.

this is what i understood by the kerberose defination.

also there is key exchange and all core topology but it is adequate to know about kerberose. Source: CoolInterview.com

Answered by: Nishant Rapate | Date: 12/2/2009 | Contact Nishant Rapate Contact Nishant Rapate

we use to this protocols is authentication Source: CoolInterview.com

Answered by: mohd tarique | Date: 3/5/2010 | Contact mohd tarique Contact mohd tarique


If you have the better answer, then send it to us. We will display your answer after the approval

Rules to Post Answers in CoolInterview.com:-

  • There should not be any Spelling Mistakes.
  • There should not be any Gramatical Errors.
  • Answers must not contain any bad words.
  • Answers should not be the repeat of same answer, already approved.
  • Answer should be complete in itself.

Post your answer here

Inform me about updated answers to this question.
Related Questions
View Answer
Hi. This is Ajay Rawat.
I want to Configure Linux Server for Internet Sharing from Linux to windows system. Can any body tell me how to do it?I have four Pcs and I want to configure one for LInux and other three for windows..............?
View Answer
Is the client is server? if yes then why & what it called?
View Answer
What is RIP what is the use of RIP?
View Answer
What is CIDR?
View Answer
What is the bandwidth of a Switch and A Hub?
View Answer
Why we use cross cable to connect same devices?
View Answer
How intervlan communication takes place in a layer 3 switch. Also the configuration details.
View Answer
What is networking?
View Answer
What do you mean by Twisted-pair Cabling ?
View Answer
What is the differnce between Unshielded twisted pair(UTP) and Shielded twisted pair(STP) ?
View Answer
In which OSI layer does a telecom sector stand for ?
View Answer
what is difference beetween ISDN and ATM?
View Answer
What is TCP/IP ? what is the use of TCP/IP?
View Answer
Why is OSI model layered?
View Answer
What is the difference between Client and desktop Operating systems?
View Answer

Please Note: We keep on updating better answers to this site. In case you are looking for Jobs, Pls Click Here Vyoms.com - Best Freshers & Experienced Jobs Website.

View All Networking Interview Questions & Answers - Exam Mode / Learning Mode




India News Network
Latest 20 Questions
An offer which is open for acceptance over a period of time is: (a) Cross Offer (b) Counter Offer (c) Standing Offer (d) Implied Offer
Specific offer can be communicated to__________ (a) All the parties of contract (b) General public in universe (c) Specific person (d) None of the above
_________ amounts to rejection of the original offer. (a) Cross offer (b) Special offer (c) Standing offer (d) Counter offer
A advertises to sell his old car by advertising in a newspaper. This offer is caleed: (a) General Offer (b) Special Offer (c) Continuing Offer (d) None of the above
In case a counter offer is made, the original offer stands: (a) Rejected (b) Accepted automatically (c) Accepted subject to certain modifications and variations (d) None of the above
In case of unenforceable contract having some technical defect, parties (a) Can sue upon it (b) Cannot sue upon it (c) Should consider it to be illegal (d) None of the above
If entire specified goods is perished before entering into contract of sale, the contract is (a) Valid (b) Void (c) Voidable (d) Cancelled
______________ contracts are also caled contracts with executed consideration. (a) Unilateral (b) Completed (c) Bilateral (d) Executory
A offers B to supply books @ Rs 100 each but B accepts the same with condition of 10% discount. This is a case of (a) Counter Offer (b) Cross Offer (c) Specific Offer (d) General Offer
_____________ is a game of chance. (a) Conditional Contract (b) Contingent Contract (c) Wagering Contract (d) Quasi Contract
There is no binding contract in case of _______ as one's offer cannot be constructed as acceptance (a) Cross Offer (b) Standing Offer (c) Counter Offer (d) Special Offer
An offer is made with an intention to have negotiation from other party. This type of offer is: (a) Invitation to offer (b) Valid offer (c) Voidable (d) None of the above
When an offer is made to the world at large, it is ____________ offer. (a) Counter (b) Special (c) General (d) None of the above
Implied contract even if not in writing or express words is perfectly _______________ if all the conditions are satisfied:- (a) Void (b) Voidable (c) Valid (d) Illegal
A specific offer can be accepted by ___________. (a) Any person (b) Any friend to offeror (c) The person to whom it is made (d) Any friend of offeree
An agreement toput a fire on a person's car is a ______: (a) Legal (b) Voidable (c) Valid (d) Illegal
"Holiday Packages" announced as an advertisement are an example of _________: (a) Offer (b) Counter Offer (c) Invitation to Offer (d) None of the above
A match fixing contract between a player and a broker is a: (a) Valid Contract (b) Unenforceable Contract (c) Void Contract (d) Illegal Contract
When a bookseller sells a book on cash payment then it is called as ___________: (a) Unilateral Contract (b) Bilateral Contract (c) Executed Contract (d) Executory Contract
____________ agreements are created by situation: (a) Written (b) Oral (c) Void (d) Implied
Cache = 0.6875 Seconds