Your firm has been awarded a contract to design a Criminal Justice Information Services Version 5.0-compliant network utilizing advanced authentication policies. Which two methods could be utilized? (Choose
two.)
A. biometric
B. PKI
C. UKI
D. password
Answer: AB
Explanation: