When accessing corporate network resources, users are required to authenticate to each application they try to
access. Which of the following concepts does this BEST represent?
A. SSO
B. Zero Trust
C. VPN
D. Role-based access control
access. Which of the following concepts does this BEST represent?
A. SSO
B. Zero Trust
C. VPN
D. Role-based access control