Comparing a KDC (Key Distribution Center) and CA (Certificate Authority) which is NOT true? OA CA is more scalable OB CA is faster (simple in complexity) OC. KDC has to be online OD. KDC is used in LANS QUESTION 6 Which is true about Kerberos OA The password does not travel on the network OB. The end user knows all of the operations taking place in the protocol OC Public keys are used for generating session keys OD. Does not need strict time synchronization QUESTION 7 Which of the following can not be satisfied by cryptography OA Non-repudiation OB Integrity OC Access control OD. Confidentiality
![Comparing a KDC (Key Distribution Center) and CA (Certificate Authority) which is NOT true?
OA CA is more scalable
OB CA is faster (simple in complexity)
OC KDC has to be online
OD. KDC is used in LANS
QUESTION 6
Which is true about Kerberos
OA The password does not travel on the network
OB. The end user knows all of the operations taking place in the protocol
OC Public keys are used for generating session keys
OD.Does not need strict time synchronization
QUESTION 7
Which of the following can not be satisfied by cryptography
OA Non-repudiation
OB. Integrity
OC Access control
OD. Confidentiality](/v2/_next/image?url=https%3A%2F%2Fcontent.bartleby.com%2Fqna-images%2Fquestion%2Fa476b8ed-eba7-45b4-a3ef-36bf4dc2cdcf%2F82bf6d83-6e81-4165-9a90-c1119b7eb774%2F2u1la0e_processed.jpeg&w=3840&q=75)
![](/static/compass_v2/shared-icons/check-mark.png)
Answer :5
In cryptography, a KDC is essential for a cryptosystem expected to lessen the dangers innate in trading keys. KDCs frequently work in frameworks inside which a few clients might have consent to utilize specific administrations at certain times and not at others.
In cryptography, an authentication authority or confirmation authority (CA) is a substance that issues advanced testaments. An advanced authentication guarantees the responsibility for public key by the named subject of the testament. This permits others (depending parties) to depend upon marks or on statements made with regards to the private key that relates to the affirmed public key. A CA goes about as a confided in outsider trusted both by the subject (proprietor) of the testament and by the party depending upon the endorsement. The organization of these authentications is indicated by the X.509 or EMV standard.
Trending now
This is a popular solution!
Step by step
Solved in 6 steps
![Blurred answer](/static/compass_v2/solution-images/blurred-answer.jpg)
![Computer Networking: A Top-Down Approach (7th Edi…](https://www.bartleby.com/isbn_cover_images/9780133594140/9780133594140_smallCoverImage.gif)
![Computer Organization and Design MIPS Edition, Fi…](https://www.bartleby.com/isbn_cover_images/9780124077263/9780124077263_smallCoverImage.gif)
![Network+ Guide to Networks (MindTap Course List)](https://www.bartleby.com/isbn_cover_images/9781337569330/9781337569330_smallCoverImage.gif)
![Computer Networking: A Top-Down Approach (7th Edi…](https://www.bartleby.com/isbn_cover_images/9780133594140/9780133594140_smallCoverImage.gif)
![Computer Organization and Design MIPS Edition, Fi…](https://www.bartleby.com/isbn_cover_images/9780124077263/9780124077263_smallCoverImage.gif)
![Network+ Guide to Networks (MindTap Course List)](https://www.bartleby.com/isbn_cover_images/9781337569330/9781337569330_smallCoverImage.gif)
![Concepts of Database Management](https://www.bartleby.com/isbn_cover_images/9781337093422/9781337093422_smallCoverImage.gif)
![Prelude to Programming](https://www.bartleby.com/isbn_cover_images/9780133750423/9780133750423_smallCoverImage.jpg)
![Sc Business Data Communications and Networking, T…](https://www.bartleby.com/isbn_cover_images/9781119368830/9781119368830_smallCoverImage.gif)