A company recently experienced a data breach when an unauthorized user accessed the network. Which questions should the network architect ask to identify an affective access solution to prevent unauthorized access in the future? (Select two)
Do users have legacy device that do not support 802.1X?
Does the company have the resources required to train users on remediation services?
Does the company's firewall support access control lists (ACL)?
Does the company have an existing RADIUS server?
Do user's devices support Secure Shell (SSH)?
Want to practice for HP0-Y50 - Architecting HP FlexNetwork Solutions ?