These the the options:
A. Users need VPN access.
B. User devices need to be scanned.
C. Multiple XenDesktop sites are in use in the environment.
D. Multiple authentication methods are used in the environment.
These the the options:
A. Users need VPN access.
B. User devices need to be scanned.
C. Multiple XenDesktop sites are in use in the environment.
D. Multiple authentication methods are used in the environment.
Copyright © 2021 Jogjafile Inc.
Answer should be B because without scanning user devices configuration policies can't be recognized.