Jill plans to optimize and control user access by implementing a technology that will allow access to all allowed systems at the time of user authentication. She is implementing the LDAP protocol to enable this service. What does Jill plan to deploy?
a. RSA
b. SSO
c. Token-based
d. 2FA
e. Nondiscretionary



Answer :

Other Questions