A company has a remote access VPN and wants to ensure that if a username and password are
compromised, the corporate network will remain secure. Which of the following will allow the
company to achieve its security goal?
A.
Posture assessment
B.
Kerberos
C.
TACACS+
D.
Two-factor authentication