Which of the following is not a weakness of Kerberos?
A.
Secret keys are vulnerable when they are temporarily stored on the users’ workstations.
B.
Network traffic is not protected if encryption is not enabled.
C.
More and more products are beginning to support it.
D.
The KDC is a single point of failure.
Explanation:
Kerberos is an authentication protocol that allows principals to
authenticate to each other. The KDC can be a single point of failure, keys are
temporarily stored on users’ workstations, which can be compromised, and if
encryption is not enabled then network traffic is not protected from eavesdropping.
Kerberos is also vulnerable to dictionary attacks.