1.

Which of the following are valid authentication methods?

A. Public Key Based
B. Password Based
C. Host Based
D. All of the mentioned
Answer» E.


Discussion

No Comment Found