Secondary authentication to verify untrusted non-3GPP access? That's a no-brainer. C is the way to go, though I'm still trying to figure out how to pronounce 'N3IWF'.
I was torn between options A and C, but I think C makes the most sense. Authenticating the UE from an untrusted access is a key purpose of secondary authentication.
Option C is definitely the correct answer. Secondary authentication is used to verify the identity of the User Equipment coming from an untrusted non-3GPP access, like a public Wi-Fi network.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Carlee
8 hours agoMalcom
3 days agoLemuel
5 days agoHana
5 days agoMerissa
6 days agoGoldie
7 days agoKris
11 days ago