ABC Corporation’s network is configured such that a user must log in individually at each server and access control. Which type of authentication is in use?
A.
Role-based access control
B.
Three-factor authentication
C.
Single sign-on
D.
Hybrid access control
E.
Mandatory sign-on