Hannah's organization is implementing a new approach to user authentication that relies upon SAML. She would like
Fantastic news! We've Found the answer you've been seeking!
Question:
Hannah's organization is implementing a new approach to user authentication that relies upon SAML. She would like to protect against eavesdropping on this traffic and also ensure that SAML traffic is not forged by an attacker. What should she do to protect against both types of attack?
A. Use SAML's secure mode to provide secure authentication.
B. Implement TLS using a strong cipher suite, which will protect against both types of attacks.
C. Implement TLS using a strong cipher suite and use digital signatures.
D. Implement TLS using a strong cipher suite and message hashing.
Related Book For
Entrepreneurship Successfully Launching New Ventures
ISBN: 9780132555524
4th Edition
Authors: Bruce R. Barringer, R. Duane Ireland
Posted Date: