A company with a US-based sales force has requested that the VPN system be configured to authenticate the sales team based on their username, password and a client side certificate. Additionally, the security administrator has restricted the VPN to only allow authentication from the US territory. How many authentication factors are in use by the VPN system?

A. 1
B. 2
C. 3
D. 4


Answer: C. 3

Computer Science & Information Technology

You might also like to view...

The instruction "Do homework problems until done" is an example of the ____ structure.

A. control B. repetition C. selection D. sequence

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. The excludes relationship contains a behavior that is common to more than one use case. 2. The communicates relationships handles exceptions to the basic use case. 3. Preconditions are the state of the system before the use case may be performed. 4. Preconditions show the state of the system after the use case has finished. 5. Middle Management forms the second, or intermediate, tier of the three-tiered management system.

Computer Science & Information Technology

If Backup is unable to copy all files in the source locations, it might be because open files might be skipped. Backup and Restore provide a ________________________ message that informs you some files were skipped

a. Backup Incomplete b. Backup Complete c. Review Your Logs d. Check Your Backup Results

Computer Science & Information Technology

Snort works primarily from the command line

Indicate whether the statement is true or false.

Computer Science & Information Technology