Which are valid ways to authenticate your identity gain access?
You are using the Jenkins CLI to communicate with a remote Jenkins master.
Which are valid ways to authenticate your identity gain access? Choose 2 answers
A . A Jenkins user’s username and GitHub API token.
B . An SSH key matching an entry in the authorized_keys file of the user account that the Jenkins master process runs "as".
C . A Jenkins user’s username and Kerberos token.
D . An SSH key matching a Jenkins user’s public key.
E . A Jenkins user’s username and password or API token.
Answer: B, D
Latest CJE Dumps Valid Version with 60 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments