You are on page 1of 1

1. What is Kerberos and why is it used?

2. What is Kerberos pre authentication and how does it work?

3. Why do I need to synchronize my workstation clock with the domain controller if I'm
using
Kerberos?
4. What is a KDC and what are its two services?

5. How does a Windows workstation locate a Kerberos authentication server?

6. What is a Kerberos Realm?

7. What is a TGT, how is it acquired and what is it used for?

8. What is a ST, how is it acquired and what is it used for?

9. In network security what is Integrity?

10. In network security what is Privacy?

11. In network security what is Authentication?

12. In network security what is Authorization?

You might also like