Which is the BEST authentication method for this scenario?

Your organization’s internal programming team developed a proprietary application for accessing
the time-management system. The application uses a custom-designed protocol. As the Security
Administrator, you must control user access to the time-management system.
Which is the BEST authentication method for this scenario?

Your organization’s internal programming team developed a proprietary application for accessing
the time-management system. The application uses a custom-designed protocol. As the Security
Administrator, you must control user access to the time-management system.
Which is the BEST authentication method for this scenario?

A.
NG with Application Intelligence authentication methods can only be applied to protocols
included in the standard, pre-defined suite.

B.
Implicit User Authentication

C.
User Authentication

D.
Session Authentication



Leave a Reply 0

Your email address will not be published. Required fields are marked *