Which of the following statements pertaining to using Kerberos without any extension is false?
A . A client can be impersonated by password-guessing.
B . Kerberos is mostly a third-party authentication protocol.
C . Kerberos uses public key cryptography.
D . Kerberos provides robust authentication.
Answer: C
Explanation: Kerberos is a trusted, credential-based, third-party authentication protocol that uses symmetric (secret) key cryptography to provide robust authentication to clients accessing services on a network.
Because a client’s password is used in the initiation of the Kerberos request for the service protocol, password guessing can be used to impersonate a client.
Here is a nice overview of HOW Kerberos is implement as described in RFC 4556:
Latest SSCP Dumps Valid Version with 1074 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund