Which of the following would need to be configured correctly to allow remote access to the network?
A.
ACLs
B.
Kerberos
C.
Tokens
D.
Biometrics
Which of the following would need to be configured correctly to allow remote access to the network?
Which of the following would need to be configured correctly to allow remote access to the network?
A.
ACLs
B.
Kerberos
C.
Tokens
D.
Biometrics