Answer: B) False
Kerberos primarily uses symmetric key encryption rather than asymmetric key encryption to validate users to network resources. Symmetric key encryption involves using the same secret key for both encryption and decryption, while asymmetric key encryption uses a pair of public and private keys. Kerberos relies on a trusted third-party authentication server to issue a session key (symmetric key) to the client and the network resource, which allows them to securely communicate. Asymmetric key encryption is typically used for other purposes such as digital signatures and key exchange but is not the primary mechanism in Kerberos authentication.