Which of the following are authentication methods that Security Gateway R77 uses to validate connection attempts?

Which of the following are authentication methods that Security Gateway R77 uses to validate
connection attempts? Select the response below that includes the MOST complete list of valid
authentication methods.

Which of the following are authentication methods that Security Gateway R77 uses to validate
connection attempts? Select the response below that includes the MOST complete list of valid
authentication methods.

A.
Proxied, User, Dynamic, Session
B. Connection, User, Client

C.
User, Client, Session

D.
User, Proxied, Session



Leave a Reply 3

Your email address will not be published. Required fields are marked *


Malkiat

Malkiat

C

You can validate from right clicking on Action tab and select Legacy