What constraints are available for use in a remote access policy?
What will be an ideal response?
The constraints available for use include the following:
* Authentication methods-The type of logon access, including access through a smart card
* Idle Timeout-How long a session can be idle before it is disconnected
* Session Timeout-Maximum time a user can be logged on during one session
* Called Station ID-Telephone number for the access server when a dial-up connection is used (rarely used today)
* Day and time restrictions-Days of the week and times of day when the remote access server is open to users
* NAS Port Type-Type of connection to the remote access server
You might also like to view...
The most prominent quality of an analyst is that of a(n):
A) problem solver. B) consultant. C) programmer. D) agent of change.
What are the four major guidelines an analyst should use to set-up training for a new system?
What will be an ideal response?
Which tool would a technician use to attach a new cable to a port on a network patch panel?
A) Tone generator B) Loopback plug C) Punch-down tool D) Multimeter
Choose Butt Caps for squared ends of a stroked path.
Answer the following statement true (T) or false (F)