Which of the following solutions will address the enter…

An enterprise must ensure that all devices that connect to its networks have been previously approved. The
solution must support dual factor mutual authentication with strong identity assurance. In order to reduce costs
and administrative overhead, the security architect wants to outsource identity proofing and second factor digital
delivery to the third party. Which of the following solutions will address the enterprise requirements?

An enterprise must ensure that all devices that connect to its networks have been previously approved. The
solution must support dual factor mutual authentication with strong identity assurance. In order to reduce costs
and administrative overhead, the security architect wants to outsource identity proofing and second factor digital
delivery to the third party. Which of the following solutions will address the enterprise requirements?

A.
Implementing federated network access with the third party.

B.
Using a HSM at the network perimeter to handle network device access.

C.
Using a VPN concentrator which supports dual factor via hardware tokens.

D.
Implementing 802.1x with EAP-TTLS across the infrastructure.



Leave a Reply 0

Your email address will not be published. Required fields are marked *