Which two methods could be utilized?

Your firm has been awarded a contract to design a Criminal Justice Information Services Version
5.0-compliant network utilizing advanced authentication policies. Which two methods could be
utilized? (Choose two.)

Your firm has been awarded a contract to design a Criminal Justice Information Services Version
5.0-compliant network utilizing advanced authentication policies. Which two methods could be
utilized? (Choose two.)

A.
biometric

B.
PKI

C.
UKI

D.
password



Leave a Reply 0

Your email address will not be published. Required fields are marked *