Which of the following statements about multi-or authentication is true?
A.
It uses a Key Distribution Center (KDC).
B.
It protects a computer from malicious software such as worms.
C.
It involves two or more methods as part of the authentication process.
D.
It is a process in which a client process and a server are required to prove their identities to
each other before performing any application function.
Explanation:
Multi-or authentication involves a combination of multiple methods of authentication. For example,
an authentication method that uses smart cards as well as usernames and passwords can be
referred to as multi-or authentication. Answer option D is incorrect. Mutual authentication is a
process in which a client process and server are required to prove their identities to each other
before performing any application function. The client and server identities can be verified through a
trusted third party and use shared secrets as in the case of Kerberos v5. The MS-CHAP v2 and EAPTLS authentication methods support mutual authentication. Answer option A is incorrect. Kerberos
authentication uses a Key Distribution Center (KDC).Answer option B is incorrect. The multi-or
authentication method cannot protect a computer from malicious software such as worms.
What is a worm?
A worm is a software program that uses computer networks and security holes to replicate itself
from one computer to another. It usually performs malicious actions, such as using the resources of
computers as well as shutting down computers.