-3

These the the options:

A. Users need VPN access.
B. User devices need to be scanned.
C. Multiple XenDesktop sites are in use in the environment.
D. Multiple authentication methods are used in the environment.

DavidPostill
  • 7,734
  • 9
  • 41
  • 60
Mary
  • 1
  • 1
  • This isn't a programming question. It would be more appropriate to ask this on serverfault.com or the Citrix forums. – donovan Apr 20 '15 at 07:09

1 Answers1

0

Answer should be B because without scanning user devices configuration policies can't be recognized.