Watch this video on YouTube
Kerberos is vulnerable to replay in which of the following circumstances?