Your organization’s internal programming team developed a proprietary application for accessing
the time-management system. The application uses a custom-designed protocol. As the Security
Administrator, you must control user access to the time-management system.
Which is the BEST authentication method for this scenario?
A.
NG with Application Intelligence authentication methods can only be applied to protocols
included in the standard, pre-defined suite.
B.
Implicit User Authentication
C.
User Authentication
D.
Session Authentication