After a large organization has completed the acquisition of a smaller company, the smaller company must implement new host-based security controls to connect its employees' devices to the network. Given that the network requires 802.1X EAP-PEAP to identify and authenticate devices, which of the following should the security administrator do to integrate the new employees' devices into the network securely?
cvMikazuki
3 years, 8 months agoalexkrycek
4 years, 3 months agoD1960
4 years agoinfosec208
4 years, 3 months agoTrap_D0_r
4 years, 5 months ago