1 What is a suppress-replay attack?
2 What problem was Kerberos designed to address?
3 What are three threats associated with user authentication over a network or Internet?
4 List three approaches to secure user authentication in a distributed environment.
5 What four requirements were defined for Kerberos?
1 What entities constitute a full-service Kerberos environment?
2 In the context of Kerberos, what is a realm?
3 What are the principal differences between version 4 and version 5 of Kerberos?
4 Provide a brief definition of network access control.
5 What is an EAP?