ExamQuestions.com

Register
Login
Information Systems Security Architecture Professional (CISSP-ISSAP) Exam Questions

ISC

Information Systems Security Architecture Professional (CISSP-ISSAP)

102 / 115

Question 102:

Which of the following schemes is used by the Kerberos authentication? 

Answer options:

A. Public key cryptography
B. One time password
C. Private key cryptography
D. OPIE