Notifications
Clear all
Topic starter
A security analyst is conceded that a third-party application may have access to user passwords during authentication .
Which of the following protocols should the application use to alleviate the analyst's concern?
- A . SAML
B. MFA
C. SHA-1
D. LADPS
Suggested Answer: A
Posted : 04/11/2022 6:49 am