Mark works as a Network Administrator for TechMart Inc. The company has a Windows-based network.
Mark wants to implement a method to ensure that themobile devices are in a good state of security health when they are trying to access the corporate network.
Which of the following is a control or strategy that Mark will implement to assure the security health?
A.
TCP/IP protocol
B.
Kerberos
C.
Single Sign On
D.
Network Access Protection