Zach, a user, logs into a system and automatically has access to other network resources without having to log in again. Which of the following is MOST likely implemented at Zachs location?
A.
Biometric authentication
B.
Single sign-on
C.
802.1x access control
D.
Two-factor authentication