Which are valid way...
 
Notifications
Clear all

Which are valid ways to authenticate your identity gain access?

1 Posts
1 Users
0 Likes
141 Views
(@colmenerocarmelo)
Noble Member
Joined: 2 years ago
Posts: 746
Topic starter  

You are using the Jenkins CLI to communicate with a remote Jenkins master.

Which are valid ways to authenticate your identity gain access? Choose 2 answers

  • A . A Jenkins user's username and GitHub API token.
  • B . An SSH key matching an entry in the authorized_keys file of the user account that the Jenkins master process runs "as".
  • C . A Jenkins user's username and Kerberos token.
  • D . An SSH key matching a Jenkins user's public key.
  • E . A Jenkins user's username and password or API token.

Show Answer Hide Answer

Suggested Answer: B, D

   
Quote

Latest CloudBees CJE Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: