Which of the following would need to be configured correctly to allow remote access to the network?

Which of the following would need to be configured correctly to allow remote access to the
network?

Which of the following would need to be configured correctly to allow remote access to the
network?

A.
ACLs

B.
Kerberos

C.
Tokens

D.
Biometrics

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *