A security administrator is tasked with implementing two-factor authentication for the company VPN. The VPN is currently configured to authenticate VPN users
against a backend RADIUS server. New company policies require a second factor of authentication, and the Information Security Officer has selected PKI as the
second factor. Which of the following should the security administrator configure and implement on the VPN concentrator to implement the second factor and
ensure that no error messages are displayed to the user during the VPN connection? (Select TWO).
A.
The user’s certificate private key must be installed on the VPN concentrator.
B.
The CA’s certificate private key must be installed on the VPN concentrator.
C.
The user certificate private key must be signed by the CA.
D.
The VPN concentrator’s certificate private key must be signed by the CA and installed on the VPN concentrator.
E.
The VPN concentrator’s certificate private key must be installed on the VPN concentrator.
F.
The CA’s certificate public key must be installed on the VPN concentrator.