A “trusted” client needs to communicate with a server that has been configured to use CLIENT
authentication. Which of the following will be used to verify passwords?

A.
User ID/password file
B.
Communications layer
C.
Client applications
D.
Operating system
https://www.ibm.com/developerworks/data/tutorials/db2-cert7302/section3.html
0
0
CLIENT Authentication takes place on the client machine (see Dealing with
untrusted clients for exceptions).
Trusted clients: Clients running non-host operating systems that have native security
features such as Windows NT®, Windows 2000®, Windows 2003®, Windows XP, and all
forms of UNIX® and Linux.
0
0