1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kupik [55]
1 year ago
8

Pieter is a network administrator for a growing company and has decided to implement Kerberos. He knows that Kerberos uses a tic

ket granting ticket system that relies on time synchronization in order to prevent replay attacks. Which of the following protocols might he implement to ensure that Kerberos will work correctly?
a. STP b. NTP c. HTTPS d. FTP
Computers and Technology
1 answer:
gulaghasi [49]1 year ago
4 0

Option b is correct. NTP is the protocol that might he implement to ensure that Kerberos will rock correctly.

A networking protocol called Network Time Protocol (NTP) is used to synchronize clocks on computers connected to packet-switched, variable-latency data networks. NTP is one of the first Internet protocols still in use, having been in use prior to 1985. David L. Mills of the University of Delaware created NTP.

NTP aims to synchronize all participating computers to Coordinated Universal Time within a few milliseconds (UTC).

It is intended to lessen the effects of fluctuating network latency by selecting precise time servers using the intersection algorithm, a modified version of Manzullo's algorithm. In ideal circumstances, NTP can achieve better than one millisecond accuracy in local area networks and can typically maintain time to within tens of milliseconds over the open Internet.

To know more about NTP click here:

brainly.com/question/28468595

#SPJ4

You might be interested in
Which of the following is the correct code to link the text "Sunny Days" to the website www.sunnysunshine.com?
coldgirl [10]

All of the above. <em><u>They're</u></em><em><u> </u></em><em><u>all</u></em><em><u> </u></em><em><u>the</u></em><em><u> </u></em><em><u>same</u></em><em><u>.</u></em>

3 0
4 years ago
If you’re storing some personal information like Debit/Credit card numbers or Passwords etc, on different sites for running you’
nata0808 [166]

Answer:

cookies are stored on client side.

A hacker would need access to your computer, either by physically reading the cookie data or by means of cross-site scripting.

Other than that, cookies should not contain passwords or credit card numbers, just things like preferences or session identifiers.

3 0
3 years ago
What does limited access to a document mean?
Licemer1 [7]
The second last one is the answer i think
7 0
4 years ago
Read 2 more answers
Develop a program so that the output will produce the following :
hammer [34]

Answer:

 #include <iostream>

using namespace std;

int main()

{

  float radius = 5.4;

  float circumference = 2 * 3.14 * radius;

  float area = 3.14 * radius * radius;

 

  cout<<"the circumference of the circle is "<<circumference<<endl;

  cout<<"the area of the circle is "<<area<<endl;

  return 0;

}

Explanation:

Include the library iostream for using the input/output instructions.

create the main function and define the variable with value. Then,

use the formula to calculate the circumference and are of circle.

circumference = 2*\pi *radius

area = \pi * radius^{2}

here, choose \pi = 3.14

after that, display the result.

Note: All variable define in float type.

4 0
3 years ago
Can someone help me with this one
MAVERICK [17]

Answer:

true

Explanation:

it is because when someone feels better about something that means that their self esteem is building up

8 0
4 years ago
Read 2 more answers
Other questions:
  • 2. What's the keyboard command that will allow you to "copy" text?
    8·2 answers
  • Within the information category of functions, you will find functions that ____.
    7·2 answers
  • The main memory of a computer is made up of a set of memory chips called ___ and ___.
    10·1 answer
  • Define a void function that calculates the sum (+), difference (-), product (*), quotient (/), and modulus (%) of two integer nu
    14·1 answer
  • How to write a program in java that finds the max number of an array of integers?
    6·1 answer
  • Asymmetric key encryption combined with the information provided by a. certificate authority allows unique identification of the
    8·1 answer
  • DRU is a small brokerage house that enables its clients to buy and sell stocks over the Internet, as well as place traditional o
    14·1 answer
  • What causes the poles of the electromagnet in an audio speaker to repeatedly switch directions?
    6·2 answers
  • As the first step, load the dataset from airline-safety.csv by defining the load_data function below. Have this function return
    9·1 answer
  • window operating system popularly known as. 1) character user interface. 2) computer user interface. 3) graphic user interface.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!