Which of the following uses a Key Distribution Center (KDC) to authenticate a principle?
A.
CHAP
B.
PAP
C.
Kerberos
D.
TACACS
Which of the following uses a Key Distribution Center (KDC) to authenticate a principle?
Which of the following uses a Key Distribution Center (KDC) to authenticate a principle?
A.
CHAP
B.
PAP
C.
Kerberos
D.
TACACS