For the following questions I would like you to discuss the particulars of each attack scenario and how Kerberos defends…