Perfect World Inc., provides its sales managers access to the company's network from remote locations. The sales managers use laptops to
connect to the network. For security purposes, the company's management wants the sales managers to log on to the network using smart
cards over a remote connection. Which of the following authentication protocols should be used to accomplish this?
necessary to make the communication as secure as possible. Also, the sales managers will be using laptops that are configured to read smart
cards. Therefore, they will use EAP, as it is highly secure and supports smart card authentication.
Currently there are no comments in this discussion, be the first to comment!