PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following authentication protocols should be used to accomplish this?

Perfect World Inc., provides its sales managers access to the company’s network from remote
locations. The sales managers use laptops to connect to the network. For security purposes, the
company’s management wants the sales managers to log on to the network using smart cards
over a remote connection. Which of the following authentication protocols should be used to
accomplish this?


Page 624 of 1,070« First...102030...622623624625626...630640650...Last »