Which of the authentication methods should be utilized by the application?

You are required to identify the appropriate authorization methodology utilized which utilizes
authentication tickets when visitors access the site allowing the authentication ticket to be traced.
Which of the authentication methods should be utilized by the application?

You are required to identify the appropriate authorization methodology utilized which utilizes
authentication tickets when visitors access the site allowing the authentication ticket to be traced.
Which of the authentication methods should be utilized by the application?

A.
You should consider utilization of Forms authentication.

B.
You should consider utilization of Integrated Windows authentication.

C.
You should consider utilization of Digest authentication.

D.
You should consider utilization of Kerberos authentication.

Explanation:
By utilization of Forms authentication you ensure that network users utilize an
authentication ticket created when a user logs on to a site. You should additionally note that the
authentication ticket can be utilized to tracks the user throughout the site.



Leave a Reply 0

Your email address will not be published. Required fields are marked *