Configuring LMI external authentication in IBM Security Verify Access, what should be implemented to secure administrative access?

Configuring LMI external authentication in IBM Security Verify Access, what should be implemented to secure administrative access?
A . Using default credentials for ease of management.
B . Requiring multi-factor authentication.
C . Limiting authentication to daytime hours.
D . Allowing anonymous access to reduce complexity.

Answer: B

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments