I agree, option A is the way to go. But you know, sometimes these certification exams try to be a little sneaky, throwing in distractors like options B and C.
Haha, yeah, they love to do that! Keeping us on our toes. But I don't think option B or C are correct here. The auth method doesn't generate root tokens, and it's not responsible for token storage.
Absolutely. And you know what they say, 'The more you sweat in practice, the less you bleed in battle.' Let's nail this question and show 'em what we've got!
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Adolph
5 months agoClarinda
6 months agoMing
6 months agoAdolph
7 months agoSharee
7 months agoAshton
7 months agoLaila
7 months agoTeri
7 months agoDenise
7 months agoNgoc
7 months agoYvonne
7 months agoAfton
7 months agoWynell
7 months agoMalika
7 months ago