In an explicit proxy setup, where is the authentication method and database configured?
- A.Proxy Policy
- B.Authentication Rule
- C.Firewall Policy
- D.Authentication scheme
Reference: examtopics_top_comment
Sign in to track wrong answers, get spaced-repetition reminders, and run timed exam mode.