Which of the following should the security administrator configure and implement on the VPN concentrator…?

A security administrator is tasked with implementing two-factor authentication for the company
VPN. The VPN is currently configured to authenticate VPN users against a backend RADIUS
server. New company policies require a second factor of authentication, and the Information
Security Officer has selected PKI as the second factor. Which of the following should the security
administrator configure and implement on the VPN concentrator to implement the second factor
and ensure that no error messages are displayed to the user during the VPN connection? (Select
TWO).

A security administrator is tasked with implementing two-factor authentication for the company
VPN. The VPN is currently configured to authenticate VPN users against a backend RADIUS
server. New company policies require a second factor of authentication, and the Information
Security Officer has selected PKI as the second factor. Which of the following should the security
administrator configure and implement on the VPN concentrator to implement the second factor
and ensure that no error messages are displayed to the user during the VPN connection? (Select
TWO).

A.
The user’s certificate private key must be installed on the VPN concentrator.

B.
The CA’s certificate private key must be installed on the VPN concentrator.

C.
The user certificate private key must be signed by the CA.

D.
The VPN concentrator’s certificate private key must be signed by the CA and installed on the
VPN concentrator.

E.
The VPN concentrator’s certificate private key must be installed on the VPN concentrator.

F.
The CA’s certificate public key must be installed on the VPN concentrator.



Leave a Reply 0

Your email address will not be published. Required fields are marked *