A “trusted” client needs to communicate with a server that has been configured to use CLIENT
authentication. Which of the following will be used to verify passwords?
A.
User ID/password file
B.
Communications layer
C.
Client applications
D.
Operating system