What are the authentication considerations for network access regarding mobile devices?
What will be an ideal response?
When a user tries to use the device to access external resources, another authentication should be performed. This will prevent the most likely security issues such as spoofing, tampering, and unauthorized information disclosure. For Internet access, the device should support dial-up authentication, multiple networking and authentication protocols such as SSL, point-to-point protocol (PPP), wireless access protocol (WAP) and wireless transport layer security (WTLS). For corporate network access the device should support password authentication protocol (PAP), Challenge handshake authentication protocol (CHAP), and various virtual private network (VPN) protocols. It is a constant challenge for a mobile device to incorporate all of these needed components into a small system that is portable and still delivers high performance.
You might also like to view...
You can press the ____ keys to group selected elements.
A. Ctrl+Z B. Ctrl+P C. Ctrl+G D. Ctrl+M
What type of cable would a technician use to connect a VoIP phone that uses PoE and is 60 feet (18.3 meters) from the switch?
A) CAT3 B) CAT6 C) Fiber D) Coaxial
Choose the correct pronoun in the following sentence.? The cheapest tickets were for the groundlings, __________ paid a penny and stood on the ground before the stage under the open sky.
A. ?who B. ?whom
The ____________________ Checker feature checks for features not supported in earlier versions of PowerPoint.
Fill in the blank(s) with the appropriate word(s).