PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following authentication protocols should be used to accomplish this?

Perfect World Inc., provides its sales managers access to the company’s network from remote
locations. The sales managers use laptops to
connect to the network. For security purposes, the company’s management wants the sales
managers to log on to the network using smart
cards over a remote connection. Which of the following authentication protocols should be used to
accomplish this?


Page 558 of 1,070« First...102030...556557558559560...570580590...Last »