Which of the following would MOST likely need to be implemented and configured on the company’s perimeter network to comply with the new security policy?

A company currently does not use any type of authentication or authorization service for remote
access. The new security policy states that all remote access must be locked down to only
authorized personnel. The policy also dictates that only authorized external networks will be
allowed to access certain internal resources.
Which of the following would MOST likely need to be implemented and configured on the
company’s perimeter network to comply with the new security policy? (Select TWO).

A company currently does not use any type of authentication or authorization service for remote
access. The new security policy states that all remote access must be locked down to only
authorized personnel. The policy also dictates that only authorized external networks will be
allowed to access certain internal resources.
Which of the following would MOST likely need to be implemented and configured on the
company’s perimeter network to comply with the new security policy? (Select TWO).

A.
VPN concentrator

B.
Firewall

C.
Proxy server

D.
WAP

E.
Layer 2 switch



Leave a Reply 0

Your email address will not be published. Required fields are marked *