As the security administrator, Nevi wants to ensure the principle of least privilege is observed. Which of the following second-hop remoting methods is he most likely to use? a. Resource-based constrained delegation b. Kerberos constrained delegation c. CredSSP d. JEA