When ________-level security is used, the client will be able to mount multiple shares without supplying further credentials after the first successful authentication.
A.
USER
When ________-level security is used, the client will be able to mount multiple shares without supplying further credentials after the first successful authentication.
When ________-level security is used, the client will be able to mount multiple shares without supplying further credentials after the first successful authentication.
A.
USER