I agree, option A is the way to go. But you know, sometimes these certification exams try to be a little sneaky, throwing in distractors like options B and C.
Haha, yeah, they love to do that! Keeping us on our toes. But I don't think option B or C are correct here. The auth method doesn't generate root tokens, and it's not responsible for token storage.
Absolutely. And you know what they say, 'The more you sweat in practice, the less you bleed in battle.' Let's nail this question and show 'em what we've got!
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Adolph
8 months agoClarinda
9 months agoMing
10 months agoAdolph
10 months agoSharee
11 months agoAshton
10 months agoLaila
10 months agoTeri
10 months agoDenise
10 months agoNgoc
10 months agoYvonne
10 months agoAfton
11 months agoWynell
11 months agoMalika
11 months ago