List of questions
Related questions
Question 61 - SY0-601 discussion
A cybersecurity administrator needs to allow mobile BYOD devices to access network resources. As the devices are not enrolled to the domain and do not have policies applied to them, which of the following are best practices for authentication and infrastructure security? (Select TWO).
A.
Create a new network for the mobile devices and block the communication to the internal network and servers
B.
Use a captive portal for user authentication.
C.
Authenticate users using OAuth for more resiliency
D.
Implement SSO and allow communication to the internal network
E.
Use the existing network and allow communication to the internal network and servers.
F.
Use a new and updated RADIUS server to maintain the best solution
Your answer:
0 comments
Sorted by
Leave a comment first