Which of the following mechanisms is a commonly used technique that allows the .NET process to
act as an authenticated user, or as an arbitrarily specified user?
A.
Data binding
B.
Impersonation
C.
Contract
D.
Message contract
Explanation:
Which of the following mechanisms is a commonly used technique that allows the .NET process to
act as an authenticated user, or as an arbitrarily specified user?
Which of the following mechanisms is a commonly used technique that allows the .NET process to
act as an authenticated user, or as an arbitrarily specified user?
A.
Data binding
B.
Impersonation
C.
Contract
D.
Message contract
Explanation: