Secondary authentication to verify untrusted non-3GPP access? That's a no-brainer. C is the way to go, though I'm still trying to figure out how to pronounce 'N3IWF'.
I was torn between options A and C, but I think C makes the most sense. Authenticating the UE from an untrusted access is a key purpose of secondary authentication.
Option C is definitely the correct answer. Secondary authentication is used to verify the identity of the User Equipment coming from an untrusted non-3GPP access, like a public Wi-Fi network.
Brande
10 days agoJanessa
11 days agoCarlee
12 days agoMalcom
15 days agoLemuel
17 days agoHana
17 days agoMerissa
18 days agoGoldie
19 days agoKris
23 days agoGarry
8 days ago