The company that you work for has recently had a security breech. During the recover and assessment, it was discovered that the malicious user used the company VPN to gain access to the network. Now your company would like to find a way to verify the identity of a user who requests access to the company through a VPN.
 
What can you recommend to the company?

A. Software tokens
B. Digital certificate
C. Access control list
D. Multifactor authentication


Answer: B

Computer Science & Information Technology

You might also like to view...

The main difference between a pure virtual function and a virtual function is:

a. The return type. b. The member access specifier. c. That a pure virtual function cannot have an implementation. d. The location in the class.

Computer Science & Information Technology

MC Operator LIKE is used for_________ .

a) creating queries. b) sorting result sets. c) pattern matching. d) None of the above.

Computer Science & Information Technology

What is stored in a after execution of the following code?

char ch = 72.8; int a = int (ch); a) 72 b) 72.8 c) 73 d) The code is syntactically incorrect

Computer Science & Information Technology

Which of the following is NOT an area in the Fields areas?

A) FILTERS B) COLUMNS C) ROWS D) LIST

Computer Science & Information Technology