The Finance Desktop pool has access to sensitive data. Enterprise security standards will not
allow external access to this desktop. The enterprise has replica servers, one of which is paired
with a security server to allow external access to desktops.
Which two actions would restrict external access to this pool? (Choose two.)
A.
assign the tag named Finance to the security server
B.
set a tag named Finance on the internal facing connection servers
C.
assign the tag named Finance to the Finance Desktop pool
D.
set a tag named Finance on the external facing connection servers