Which of the following would need to be configured correctly to allow remote access to the network?

Which of the following would need to be configured correctly to allow remote access to the network?

Which of the following would need to be configured correctly to allow remote access to the network?

A.
ACLs

B.
Kerberos

C.
Tokens

D.
Biometrics



Leave a Reply 0

Your email address will not be published. Required fields are marked *