PdfPrep.com

When using endpoint access control, which two access methods are valid for authentication and authorization? (Choose two.)

When using endpoint access control, which two access methods are valid for authentication and authorization? (Choose two.)
A . Microsoft Challenge Handshake Authentication
B . Protected extensible authentication
C . MAC Authentication Bypass
D . Password Authentication Protocol Bypass
E . Web authentication

Answer: C, E

Exit mobile version