Which of the following is a control or strategy that Mark will implement to assure the security health?

Mark works as a Network Administrator for TechMart Inc. The company has a Windows-based network.
Mark wants to implement a method to ensure that themobile devices are in a good state of security health when they are trying to access the corporate network.
Which of the following is a control or strategy that Mark will implement to assure the security health?

Mark works as a Network Administrator for TechMart Inc. The company has a Windows-based network.
Mark wants to implement a method to ensure that themobile devices are in a good state of security health when they are trying to access the corporate network.
Which of the following is a control or strategy that Mark will implement to assure the security health?

A.
TCP/IP protocol

B.
Kerberos

C.
Single Sign On

D.
Network Access Protection



Leave a Reply 0

Your email address will not be published. Required fields are marked *