As the security administrator, Nevi wants to ensure the principle of least privilege is observed. Which of the following second-hop remoting methods is he most likely to use?
a. Resource-based constrained delegation
b. Kerberos constrained delegation
c. CredSSP
d. JEA