Notifications
Clear all
Topic starter
24/10/2022 10:30 pm
A security analyst is conceded that a third-party application may have access to user passwords during authentication.
Which of the following protocols should the application use to alleviate the analyst's concern?
- A . SAML
- B . MFA
- C . SHA-1
- D . LADPS
Suggested Answer: A