Basic CS-Networks [3i Infotech Placement]: Sample Questions 76 - 77 of 90

Glide to success with Doorsteptutor material for competitive exams : get questions, notes, tests, video lectures and more- for all subjects of your exam.

Question 76

Networks
Edit

Write in Short

Short Answer▾

What do you meant by “triple X” in Networks?

Explanation

  • The function of packet assembler and disassembler (PAD) is described in a document known as X. 3.
  • The standard protocol defined between the terminal and PAD is called X. 28;
  • Another protocol exists between PAD and the network called X. 29.
  • These three recommendations are often called “triple X” .
  • Used to connect a dumb terminal to X. 25 network.

Question 77

Networks
Edit

Describe in Detail

Essay▾

What is Kerberos?

Explanation

Define Kerberos in Image
  • Protocol for authenticating service requests between trusted hosts across an untrusted network like internet.
  • Developed for project Athena at Massachusetts Institute of Technology.
  • Works by requesting an encrypted ticket via an authenticated server sequence to use services.
  • Protocol gets its name from the three headed dog that guarded the gates of Hades in Greek mythology.
  • Uses encryption to prevent intruders from discovering passwords and gaining unauthorized access to files.
  • The ticket-granting ticket is sent to the ticket-granting server, which is required to use the same authentication server.
  • Ticket is then embedded in message to identify the sender of the message.

Benefits of Kerberos:

  • Delegated authentication.
  • Interoperability.
  • More efficient authentication to server.
  • Mutual authentication.

Developed by: