When using endpoint access control, which two access methods are valid for authentication and authorization? (Choose two.)

Posted by: Pdfprep Category: 300-208 Tags: , ,

When using endpoint access control, which two access methods are valid for authentication and authorization? (Choose two.)
A . Microsoft Challenge Handshake Authentication
B . Protected extensible authentication
C . MAC Authentication Bypass
D . Password Authentication Protocol Bypass
E . Web authentication

Answer: C, E

Leave a Reply

Your email address will not be published.