Configuring LMI external authentication in IBM Security Verify Access, what should be implemented to secure administrative access?
A . Using default credentials for ease of management.
B . Requiring multi-factor authentication.
C . Limiting authentication to daytime hours.
D . Allowing anonymous access to reduce complexity.
Answer: B
Latest C1000-129 Dumps Valid Version with 120 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund