PrepAway - Latest Free Exam Questions & Answers

Tag: Exam CISSP-ISSAP (updat February, 19th 2015)

Exam CISSP-ISSAP: ISSAP Information Systems Security Architecture Professional (updat February, 19th 2015)

Which of the following authentication protocols should be used to accomplish this?

Perfect World Inc., provides its sales managers access to the company’s network from remote
locations. The sales managers use laptops to
connect to the network. For security purposes, the company’s management wants the sales
managers to log on to the network using smart
cards over a remote connection. Which of the following authentication protocols should be used to
accomplish this?


Page 24 of 25« First...10...2122232425