Kerberos is a computer network authentication protocol that allows individuals communicating
over a non-secure network to prove their identity to one another in a secure manner. Which of the
following statements are true about the Kerberos authentication scheme? Each correct answer
represents a complete solution. Choose all that apply.
A.
Kerberos requires continuous availability of a central server.
B.
Dictionary and brute force attacks on the initial TGS response to a client may reveal the
subject’s passwords.
C.
Kerberos builds on Asymmetric key cryptography and requires a trusted third party.
D.
Kerberos requires the clocks of the involved hosts to be synchronized.