79.5k views
3 votes
Dion Training uses an authentication protocol to connect a network client to a networked file server by providing its authentication credentials. The file server then uses the authentication credentials to issue an authentication request to the server running this protocol. The server can then exchange authentication messages with the file server on behalf of the client. Throughout this process, a shared secret is used to protect the communication. Which of the following technologies relies upon the shared secret?

A. PKI
B. LDAP
C. RADIUS
D. Kerberos

User Leny
by
8.5k points

1 Answer

3 votes

Final answer:

The correct answer is option D. Kerberos, which is an authentication protocol that relies on a shared secret for securing network communication.

Step-by-step explanation:

Kerberos is an authentication protocol used for network security. It utilizes a shared secret to encrypt the communications between a client and a server. This protocol operates based on tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner. It uses tickets and encrypted messages to verify identity and provide access to services.

The shared secret is a pre-established key known both to the client and the server, which is used to secure the transmission of information. If the given credentials are valid, the Kerberos server will provide a ticket that allows the client to access the file server.

This process ensures that sensitive data is transmitted securely and that both parties are authenticated. Kerberos is an authentication protocol that relies upon a shared secret to protect communication between a network client and a networked file server. It provides secure authentication by encrypting the communication using the shared secret, preventing unauthorized access to sensitive information.

User Eduardo Elias
by
7.9k points