What should you do?

You need to design a remote access strategy for portable computers. Your solution must meet business requirements. What should you do?

You need to design a remote access strategy for portable computers. Your solution must meet business requirements. What should you do?

A.
Issue a computer certificate to P_RAS1. Reconfigure the remote access policy on P_RAS1 to accept only EAP-MD5 authentication. Then, specify that P_RAS1’s computer certificate is to
be used for authentication.

B.
Issue a user certificate to the Administrator account on P_RAS1. Reconfigure the remote access policy to accept only EAP-MD5 authentication. Then, specify that the Administrator account ?s user certifi cat e i s to be used for authentication.

C.
Issue a computer certificate to P_RAS1. Reconfigure the remote access policy to accept only EAP-TLS authentication. Then, specify that P_RAS1’s computer certificate is to be used for authentication.

D.
Issue a user certificate to the Administrator account on P_RAS1. Reconfigure the remote access policy to accept only EAP-TLS authentication. Then, specify that the Administrator account’s user certificate is to be used for authentication.



Leave a Reply 0

Your email address will not be published. Required fields are marked *