Which of the following would MOST likely need to be implemented and configured on the company’s perimeter network to comply with the new security policy?

Posted by: Pdfprep Category: CAS-001 Tags: , ,

A company currently does not use any type of authentication or authorization service for remote access. The new security policy states that all remote access must be locked down to only authorized personnel. The policy also dictates that only authorized external networks will be allowed to access certain internal resources.

Which of the following would MOST likely need to be implemented and configured on the company’s perimeter network to comply with the new security policy? (Select TWO).
A . VPN concentrator
B . Firewall
C . Proxy server
D . WAP
E . Layer 2 switch

Answer: A,B

Leave a Reply

Your email address will not be published.