YouneedtodesignasecuritystrategyfortheWebfoldersandfilescreatedbytheconsultantsandtheinternalWebdevelopers.Whataretwopossiblewaystoachievethisgoal?() A.RequiretheinternalWebdeveloperstouseTelnetwithKerberosauthentication.RequiretheconsultantstouseL2TPwithIPSecB.RequiretheinternalWebdeveloperstouseEncryptingFileSystem(EFS)overWebDistributedAuthoringandVersioning(WebDAV).RequiretheconsultantstouseMicrosoft.NETPassportauthenticationwithSecurityLevel0C.RequiretheinternalWebdeveloperstouseWebDistributedAuthoringandVersioning(WebDAV)overSSL.RequiretheconsultantstouseWebDAVoverSSLD.RequiretheinternalWebdeveloperstouseL2TPwithIPSec.RequiretheconsultantstouseEncryptingFileSystem(EFS)overWebDistributedAuthoringandVersioning(WebDAV)E.RequiretheinternalWebdeveloperstouseWebDistributedAuthoringandVersioning(WebDAV)overSSL.RequiretheconsultantstouseL2TPwithIPSec
YouneedtodesignasecuritystrategyfortheWebfoldersandfilescreatedbytheconsultantsandtheinternalWebdevelopers.Whataretwopossiblewaystoachievethisgoal?()
A.RequiretheinternalWebdeveloperstouseTelnetwithKerberosauthentication.RequiretheconsultantstouseL2TPwithIPSec
B.RequiretheinternalWebdeveloperstouseEncryptingFileSystem(EFS)overWebDistributedAuthoringandVersioning(WebDAV).RequiretheconsultantstouseMicrosoft.NETPassportauthenticationwithSecurityLevel0
C.RequiretheinternalWebdeveloperstouseWebDistributedAuthoringandVersioning(WebDAV)overSSL.RequiretheconsultantstouseWebDAVoverSSL
D.RequiretheinternalWebdeveloperstouseL2TPwithIPSec.RequiretheconsultantstouseEncryptingFileSystem(EFS)overWebDistributedAuthoringandVersioning(WebDAV)
E.RequiretheinternalWebdeveloperstouseWebDistributedAuthoringandVersioning(WebDAV)overSSL.RequiretheconsultantstouseL2TPwithIPSec