Which of the following are constraints found in the Constraints tab of a network policy's properties dialog box?

A. authentication method
B. session timeout
C. day and time restrictions
D. groups


Answer: A, B & C.

A. authentication method
B. session timeout
C. day and time restrictions

Computer Science & Information Technology

You might also like to view...

If you had a choice between DSL and cable modem, which would provide the highest potential data rate?

What will be an ideal response?

Computer Science & Information Technology

What is not an option in the Layout Options for Grouped Data in the Report Wizard?

A) Outline B) Stepped C) Block D) Multi-level

Computer Science & Information Technology

In its simplest form, Amdahl's Law maintains that if a given program would take one hour to run to completion with one processor, but 80 percent of the program had to run sequentially (and therefore could not be sped up by applying additional processors to it), then a resulting parallel program would run only a maximum of ____ percent faster.

A. 5 B. 10 C. 20 D. 25

Computer Science & Information Technology

A ____ is a collection of useful, prewritten algorithms.

a. structure b. hierarchy c. library d. system

Computer Science & Information Technology