An organization uses a Kerberos-based LDAP service for network authentication. The service is also utilized for
internal web applications. Finally access to terminal applications is achieved using the same authentication
method by joining the legacy system to the Kerberos realm. This company is using Kerberos to achieve which
of the following?
A.
Trusted Operating System
B.
Rule-based access control
C.
Single sign on
D.
Mandatory access control