The newly appointed trainee technician wants to know where Kerberos is mainly used. What will your reply be?
A.
Session-layer protocols, for data integrity and checksum verification.
B.
Application-layer protocols, like Telnet and FTP.
C.
Presentation-layer protocols, as the implicit authentication system for data stream or RPC.
D.
Transport and Network-layer protocols, for host to host security in IP, UDP, or TCP.