which client connection methods can be implemented based on the security policy.What should you identify?