ExamGecko
Question list
Search
Search

Question 87 - COF-R02 discussion

Report
Export

Which of the following are valid methods for authenticating users for access into Snowflake? (Select THREE)

A.
SCIM
Answers
A.
SCIM
B.
Federated authentication
Answers
B.
Federated authentication
C.
TLS 1.2
Answers
C.
TLS 1.2
D.
Key-pair authentication
Answers
D.
Key-pair authentication
E.
OAuth
Answers
E.
OAuth
F.
OCSP authentication
Answers
F.
OCSP authentication
Suggested answer: B, D, E
asked 23/09/2024
Jorge Pinto
30 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first