Which of the following is MOST likely implemented at Zachs location?

Zach, a user, logs into a system and automatically has access to other network resources without having to log in again. Which of the following is MOST likely implemented at Zachs location?

Zach, a user, logs into a system and automatically has access to other network resources without having to log in again. Which of the following is MOST likely implemented at Zachs location?

A.
Biometric authentication

B.
Single sign-on

C.
802.1x access control

D.
Two-factor authentication



Leave a Reply 0

Your email address will not be published. Required fields are marked *