Question 24:
Which of the following security design patterns provides an alternative by requiring that a user`s authentication credentials be verified by the database before providing access to that user`s data?
Answer options:
A. Secure assertion B. Authenticated session C. Password propagation D. Account lockout