answersLogoWhite

0

You may not know it, but your network is probably unsecured right now. Anyone with the right tools could capture, manipulate, and add data between the connections you maintain with the internet. The security cat and mouse game isn't one sided, however. Network administrators are currently taking advantage of Kerberos to help combat security concerns.

User Avatar

Wiki User

14y ago

What else can I help you with?

Related Questions

What are the two most popular authentication protocols?

one way authentication and mutual authentication


What periodically verifies the identity of the client to the server?

Chap (Challenge Handshake Authentication Protocol)


The protocols used to encrypt account names and passwords are called authentication protocols The two most popular protocols are and Kerberos?

CHAP (Challenge Handshake Authentication Protocol) The CHAP provides protection against palyback attack by the peer also requires both the client and server.


What is the CHAP Protocol used for?

In computing, CHAP, or Challenge-Handshake Authentication Protocol, is used to authenticate a user who is attempting to connect onto another system.


Which authentication protocol uses key distribution center server?

Kerberos


What encryption protocol does Windows XP use when sending an account name and password to a domain controller for validation?

Windows 2000/XP uses Kerberos. A+ Guide to managing and maintaing you PC pg. 1035 Winddows xp used to authentication protocol to enctypt account name and password . the most popular protocols are Challenge handshake authentication protocol and kerberos is the default used by windows 2000/ xp . When the user login to the network the username and the password must passed over the network in order to be authenticated by the domain controller.


What is Kerberos Authentication?

http://en.wikipedia.org/wiki/Kerberos_(protocol) Why ask a question when you can more easily and quickly read the answer on wikipedia? This is true for a large majority of questions that start with "What is"


Which authentication protocol does IIS7's Windows Authentication module use for computers that are members of an Active Directory Domain?

Kerberos


What does CHAP stands for in computer language?

Challange Handshake Authentication Protocol


What is the default authentication protocol in an Active Directory network?

kerberos version 5 NTLM protocols are used by AD


Which authentication protocol do Windows 2000 clients logging on to a Windows Server 2003 domain use?

Kerberos


How often does the Challenge Handshake Authentication Protocol create a handshake between a client and a server?

At initial connection and at random intervalsAnswer Explanation: The Challenge Handshake Authentication Protocol was formed to protect against attacks. A server sends a "challenge" to the client computer when first connecting. The computer then responds to the "challenge" by combining it with it's own password. It then sends this to the server, which studies it by making a hash value of its own and comparing the two hash values. If they're are equal, then the connection is established. This is repeated at random times to prevent against attacks. The other options are wrong. The "handshake" happens at the first connection and at random intervals. It doesn't happen at the end of the connection.