1)Currently, system administrators create Ken 7 users in each computer where users need access. How will remote users connect to the Ken 7 network? How will they identify themselves?
2)How will the procedures for making changes to the user accounts, such as password changes, be different for remote users?
3)What action should administrators take for the existing local users to allow a single user account to be used for local and remote access?
4)How will the administrators resolve the differences between the user accounts defined for local and remote access? Will there be any differences?
5)How will the procedure for defining access controls change after enabling remote access?