PrepAway - Latest Free Exam Questions & Answers

Category: ISSAP

Exam ISSAP: ISC2 Information Systems Security Architecture Professional

Which of the following authentication protocols should be used to accomplish this?

Perfect World Inc., provides its sales managers access to the company’s network from remote
locations. The sales managers use laptops to
connect to the network. For security purposes, the company’s management wants the sales
managers to log on to the network using smart
cards over a remote connection. Which of the following authentication protocols should be used to
accomplish this?


Page 24 of 25« First...10...2122232425