Your firm has been awarded a contract to design a Criminal Justice Information Services Version
5.0-compliant network utilizing advanced authentication policies. Which two methods could be
utilized? (Choose two.)
A.
biometric
B.
PKI
C.
UKI
D.
password