Your company’s new Internet application has complex requirements for the restriction of web page
access, and you know the site’s current security requirements are subject to change. You have
recommended to your Chief Technology Officer that the Java Authentication and
Authorization Service (JAAS) should be used for security. Which three security features
influenced your decision? (Choose three.)
A.
Single sign-on support
B.
A framework for SOA governance
C.
Pluggable Authentication Modules
D.
Secure Internet connections using sockets
E.
A framework for encryption, key generation, and key agreement
F.
A flexible access control policy for user-based, group-based, and role-based authorization