Network Defense Essentials (NDE) 2025 – 400 Free Practice Questions to Pass the Exam

Image Description

Question: 1 / 545

What protocol did Sally implement for authenticating requests in computer networks?

Kerberos

The implementation of Kerberos for authenticating requests in computer networks is an effective choice due to its design as a secure method for mutual authentication. Kerberos employs a ticketing system, where clients and servers prove their identities to each other without sending passwords over the network, reducing the risk of interception.

This protocol is particularly valuable in environments where multiple services are accessed by users, as it allows single sign-on capabilities, which enhance user convenience while maintaining strong security. Kerberos operates with a trusted third-party system for issuing tickets, ensuring that sensitive authentication credentials are not exposed.

The other options represent alternative methods of authentication but do not suit the specific scenario that highlights mutual authentication in a networked environment as effectively as Kerberos does. RADIUS is commonly used for remote access authentication, particularly for network devices. LDAP facilitates directory services but does not inherently manage authentication in the same detailed way as Kerberos. SAML is more focused on federated identity management and is primarily used in web-based applications for exchanging authentication and authorization data between parties, making it less suitable for general network request authentication in the way Kerberos does.

Get further explanation with Examzify DeepDiveBeta

RADIUS

LDAP

SAML

Next Question

Report this question

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy