Your organization is implementing remote access for company laptops. Which of the following security systems should be implemented? (Choose two)

A. VPN
B. H.323
C. multi-factor authentication for users
D. IPS


A,C
Explanation: The remote connections should be secured with a virtual private network implementation and the remote authentication process should be enhanced by requiring multiple factors.

Computer Science & Information Technology

You might also like to view...

?The members of the _______ review and consider the corporate objectives, goals, and strategies, and they can generate many ideas for IS projects that support corporate objectives and goals.

A. ?senior management B. ?accounting department C. ?IS organization D. ?investors group

Computer Science & Information Technology

The Document panel houses all the layers in a document and offers you many options for manipulating those layers.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

One way to shorten the critical path is to add__________________ hours, which are work hours outside of those specified by the calendar, to resources assigned to critical tasks.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

EX Case 1-1Louise is preparing her end of year classroom assessment reports using Microsoft Excel. Her principal has requested that she print out several different worksheets so they can discuss them together. To create a footer on each worksheet page, Louise would click the ____ tab, then click the Header & Footer button.

A. Page Layout B. Data C. Insert D. File

Computer Science & Information Technology