A customer needs the devices in their non-secure network to communicate in a secure manner. They are considering implementing Kerberos network authentication in their environment.
Which impact will this have when using iLO 5 with their HPE ProLiant Gen10 servers?
A . It will enable two-factor authentication when users log on to iL
C . It will enhance iLO security by leveraging the key stored in the silicon root of trust.
D . It will allow the servers’ iLO to detect compromised firmware code.
E . It will enable Zero Sign In to log in to iLO without entering a user name and password.
Answer: D