Which of the following authentication protocols should be used to accomplish this?

Last Updated on March 25, 2022 by Admin 3

Perfect World Inc., provides its sales managers access to the company’s network from remote locations. The sales managers use laptops to connect to the network. For security purposes, the company’s management wants the sales managers to log on to the network using smart cards over a remote connection. Which of the following authentication protocols should be used to accomplish this?

  • Challenge Handshake Authentication Protocol (CHAP)
  • Microsoft Challenge Handshake Authentication Protocol (MS-CHAP)
  • Open Shortest Path First (OSPF)
  • Extensible Authentication Protocol (EAP)
0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments