An enterprise must ensure that all devices that connect to its networks have been previously approved. The solution must support dual factor mutual authentication with strong identity assurance. In order to reduce costs and administrative overhead, the security architect wants to outsource identity proofing and second factor digital delivery to the third party. Which of the following solutions will address the enterprise requirements?

An enterprise must ensure that all devices that connect to its networks have been previously approved. The solution must support dual factor mutual authentication with strong identity assurance. In order to reduce costs and administrative overhead, the security architect wants to outsource identity proofing and second factor digital delivery to the third party. Which of the following solutions will address the enterprise requirements?
A . Implementing federated network access with the third party.
B . Using a HSM at the network perimeter to handle network device access.
C . Using a VPN concentrator which supports dual factor via hardware tokens.
D . Implementing 802.lx with EAP-TILS across the infrastructure.

Answer: D

Explanation:

IEEE 802.lX (also known as Dotlx) is an IEEE Standard for Port-based Network Access Control (PNAC). It is part of the IEEE 802.1 group of networking protocols. It provides an authentication mechanism to devices wishing to attach to a LAN or WLAN.

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments