Which of the following solutions should the security administrator implement?

A new company requirement mandates the implementation of multi-factor authentication to access
network resources. The security administrator was asked to research and implement the most
cost-effective solution that would allow for the authentication of both hardware and users. The
company wants to leverage the PKI infrastructure which is already well established. Which of the
following solutions should the security administrator implement?

A new company requirement mandates the implementation of multi-factor authentication to access
network resources. The security administrator was asked to research and implement the most
cost-effective solution that would allow for the authentication of both hardware and users. The
company wants to leverage the PKI infrastructure which is already well established. Which of the
following solutions should the security administrator implement?

A.
Issue individual private/public key pairs to each user, install the private key on the central
authentication system, and protect the private key with the user’s credentials. Require each user
to install the public key on their computer.

B.
Deploy USB fingerprint scanners on all desktops, and enable the fingerprint scanner on all
laptops. Require all network users to register their fingerprint using the reader and store the
information in the central authentication system.

C.
Issue each user one hardware token. Configure the token serial number in the user properties
of the central authentication system for each user and require token authentication with PIN for
network logon.

D.
Issue individual private/public key pairs to each user, install the public key on the central
authentication system, and require each user to install the private key on their computer and
protect it with a password.



Leave a Reply 0

Your email address will not be published. Required fields are marked *