Which of the following are needed to implement these re…

A network engineer wants to deploy user-based authentication across the company’s wired and wireless
infrastructure at layer 2 of the OSI model. Company policies require that users be centrally managed and
authenticated and that each user’s network access be controlled based on the user’s role within the company.
Additionally, the central authentication system must support hierarchical trust and the ability to natively
authenticate mobile devices and workstations. Which of the following are needed to implement these
requirements? (Select TWO).

A network engineer wants to deploy user-based authentication across the company’s wired and wireless
infrastructure at layer 2 of the OSI model. Company policies require that users be centrally managed and
authenticated and that each user’s network access be controlled based on the user’s role within the company.
Additionally, the central authentication system must support hierarchical trust and the ability to natively
authenticate mobile devices and workstations. Which of the following are needed to implement these
requirements? (Select TWO).

A.
SAML

B.
WAYF

C.
LDAP

D.
RADIUS

E.
Shibboleth

F.
PKI



Leave a Reply 0

Your email address will not be published. Required fields are marked *