PrepAway - Latest Free Exam Questions & Answers

Which of the following are needed to implement these re…

A network engineer wants to deploy user-based authentication across the company’s wired and wireless infrastructure at layer 2 of the OSI model. Company
policies require that users be centrally managed and authenticated and that each user’s network access be controlled based on the user’s role within the company.
Additionally, the central authentication system must support hierarchical trust and the ability to natively authenticate mobile devices and workstations. Which of the
following are needed to implement these requirements? (Select TWO).

PrepAway - Latest Free Exam Questions & Answers

A.
SAML

B.
WAYF

C.
LDAP

D.
RADIUS

E.
Shibboleth

F.
PKI


Leave a Reply