Which authentication method should be employed to provide for the desired level of security for customers who log on using portable computers?
A.
MS-CHAP v2.
B.
Two-factor authentication.
C.
IPSec authentication.
D.
802.1x authentication.
Which authentication method should be employed to provide for the desired level of security for customers who log on using portable computers?
Which authentication method should be employed to provide for the desired level of security for customers who log on using portable computers?
A.
MS-CHAP v2.
B.
Two-factor authentication.
C.
IPSec authentication.
D.
802.1x authentication.