Posted by: Pdfprep Post Date: October 11, 2020
A company currently does not use any type of authentication or authorization service for remote access. The new security policy states that all remote access must be locked down to only authorized personnel. The policy also dictates that only authorized external networks will be allowed to access certain internal resources.
Which of the following would MOST likely need to be implemented and configured on the company’s perimeter network to comply with the new security policy? (Select TWO).
A . VPN concentrator
B . Firewall
C . Proxy server
D . WAP
E . Layer 2 switch
Leave a Reply