1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tekilochka [14]
3 years ago
15

There are parallels between the trust models in Kerberos and Public Key Infrastructure (PKI). When we compare them side by side,

Kerberos tickets correspond most closely to which of the following?
a. private-key certificates.
b. private keys.
c. public-key certificates.
d. public keys.
Computers and Technology
1 answer:
Ivanshal [37]3 years ago
6 0

Answer:

<u>c. public-key certificates.</u>

Explanation:

It is important to<em> note</em> that in Kerberos infrastructure, <em>tickets </em>are issued by a third party as part of the authentication process.

This authentication process corresponds most closely to that of the Public Key certificates Infrastructure since it is a third party that issues out tickets to authenticate both parties engaged in the communication over a network.

You might be interested in
3
sergiy2304 [10]

Answer: I believe this would be A.) choosing an alternative

Explanation:

6 0
3 years ago
Read 2 more answers
Which port must be open on your router to allow you to upload device configuration and firmware updates using trivial file trans
Vika [28.1K]

Answer:

UDP Port 69

<em>Trivial file transfer protocol (TFTP) operates over UDP port 69.</em>

Explanation:

UDP port 69 uses the Datagram Protocol, a communications protocol for the Internet network layer, transport layer, and session layer. This protocol when used over PORT 69 makes possible the transmission of a datagram message from one computer to an application running in another computer. UDP is used with <em>IP (the Internet Protocol)</em> and UDP Port 69 is <em>connectionless </em>which means it does not give reliable communication; it’s up to the application that received the message on Port 69 to process any errors and verify correct delivery.

3 0
3 years ago
You created the following dictionary relationships = {'Jimmy':'brother', 'Carol':'sister'}. You then executed the following code
dybincka [34]

Answer:

This is because the key in relationships['jimmy'] is wrong. The first letter "j" should be uppercase. The key in the given dictionary is "Jimmy" and therefore a lowercase "j" will result in a KeyError exception. The key is case sensitive and therefore a minor mistake in a single letter either in lowercase or uppercase will cause the error. The correct usage of key to address the value should be relationships["Jimmy"].

3 0
3 years ago
Which of the following is a primary disadvantage of using a GUI HTML editor to develop your Webpages?
lora16 [44]

Answer:

C (Most feasible option)

Explanation:

I am not sure but option C seems most probable, all other options do not seem to be true

7 0
3 years ago
When are numbered lists generally used?
laiz [17]
<span>C. when listing items that have an order of priority </span>
4 0
3 years ago
Read 2 more answers
Other questions:
  • Suppose a data broker correctly identifies that your grandmother is addicted to playing online hearts. From its business intelli
    8·1 answer
  • 5. How should you use LinkedIn Answers as a professional?
    8·1 answer
  • Each time the user selects an item from a list box in a web page, a postback occurs, the web page will redisplay, and the page_l
    12·1 answer
  • What is hydraulic fracturing?
    7·1 answer
  • One common method of converting symbols into binary digits for computer processing is called ASCII​ (American Standard Code of I
    5·1 answer
  • Write a do-while loop that continues to prompt a user to enter a number less than 100, until the entered number is actually less
    6·2 answers
  • PLEASE HELP, Answer Correctly..Will give a bunch of brainlist points ​
    10·1 answer
  • Which of the following is the best description of an ip address?
    8·1 answer
  • In this paper https://arxiv.org/pdf/2008.10150.pdf, I'm having a hard time understanding how the assignment in the picture is de
    10·2 answers
  • What are two benefits of defining a function?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!