An organization is moving its human resources system to a cloud services provider.The company plans to continue using internal usernames and passwords with the service provider, but the security manager does not want the service provider to have a company of the passwords.Which of the following options meets all of these requirements?

A. Two-factor authentication
B. Account and password synchronization
C. Smartcards with PINS
D. Federated authentication


Answer: D. Federated authentication

Computer Science & Information Technology

You might also like to view...

The_______ instructs the PSP parser not to evaluate any scriptlets contained within the resource.

a) action. b) action. c) include directive. d) None of the above.

Computer Science & Information Technology

The _________ method moves a thread from the waiting state to the ready state.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

It is possible to use POD to print one copy of a book

Indicate whether the statement is true or false

Computer Science & Information Technology

Adjusting the column width of any field to fit the contents is referred to as ________

Fill in the blank(s) with correct word

Computer Science & Information Technology