Which three of the following can be used as SSO sources? (Choose three.)
Correct Answer:
ABD
🗳️
You have implemented two-factor authentication to enhance security to sensitive enterprise systems.
How could you bypass the need for two-factor authentication for users accessing form specific secured networks?
Correct Answer:
A
🗳️
When configuring an active-passive HA deployment, what is the recommended data synchronization path?
Correct Answer:
D
🗳️
Which FSSO discovery method transparently detects logged off users without having to rely on external features such as WMI polling?
Correct Answer:
B
🗳️