An enterprise must ensure that all devices that connect to its networks have been previously approved. The solution must support dual factor mutual authentication with strong identity assurance. In order to reduce costs and administrative overhead, the security architect wants to outsource identity proofing and second factor digital delivery to the third party. Which of the following solutions will address the enterprise requirements?

Posted by: Pdfprep Category: CAS-002 Tags: , ,

An enterprise must ensure that all devices that connect to its networks have been previously approved. The solution must support dual factor mutual authentication with strong identity assurance. In order to reduce costs and administrative overhead, the security architect wants to outsource identity proofing and second factor digital delivery to the third party. Which of the following solutions will address the enterprise requirements?
A . Implementing federated network access with the third party.
B . Using a HSM at the network perimeter to handle network device access.
C . Using a VPN concentrator which supports dual factor via hardware tokens.
D . Implementing 802.1x with EAP-TTLS across the infrastructure.

Answer: D

Leave a Reply

Your email address will not be published.