Comparing a KDC (Key Distribution Center) and CA (Certificate Authority) which is NOT true? OA CA is more scalable OB CA is faster (simple in complexity) OC. KDC has to be online OD. KDC is used in LANS QUESTION 6 Which is true about Kerberos OA The password does not travel on the network OB. The end user knows all of the operations taking place in the protocol OC Public keys are used for generating session keys OD. Does not need strict time synchronization QUESTION 7 Which of the following can not be satisfied by cryptography OA Non-repudiation OB Integrity OC Access control OD. Confidentiality

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question
Comparing a KDC (Key Distribution Center) and CA (Certificate Authority) which is NOT true?
OA CA is more scalable
OB CA is faster (simple in complexity)
OC KDC has to be online
OD. KDC is used in LANS
QUESTION 6
Which is true about Kerberos
OA The password does not travel on the network
OB. The end user knows all of the operations taking place in the protocol
OC Public keys are used for generating session keys
OD.Does not need strict time synchronization
QUESTION 7
Which of the following can not be satisfied by cryptography
OA Non-repudiation
OB. Integrity
OC Access control
OD. Confidentiality
Transcribed Image Text:Comparing a KDC (Key Distribution Center) and CA (Certificate Authority) which is NOT true? OA CA is more scalable OB CA is faster (simple in complexity) OC KDC has to be online OD. KDC is used in LANS QUESTION 6 Which is true about Kerberos OA The password does not travel on the network OB. The end user knows all of the operations taking place in the protocol OC Public keys are used for generating session keys OD.Does not need strict time synchronization QUESTION 7 Which of the following can not be satisfied by cryptography OA Non-repudiation OB. Integrity OC Access control OD. Confidentiality
Expert Solution
Step 1

 

Answer :5 

 

In cryptography, a KDC is essential for a cryptosystem expected to lessen the dangers innate in trading keys. KDCs frequently work in frameworks inside which a few clients might have consent to utilize specific administrations at certain times and not at others.

In cryptography, an authentication authority or confirmation authority (CA) is a substance that issues advanced testaments. An advanced authentication guarantees the responsibility for public key by the named subject of the testament. This permits others (depending parties) to depend upon marks or on statements made with regards to the private key that relates to the affirmed public key. A CA goes about as a confided in outsider trusted both by the subject (proprietor) of the testament and by the party depending upon the endorsement. The organization of these authentications is indicated by the X.509 or EMV standard.

trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 6 steps

Blurred answer
Similar questions
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY