What constraints are available for use in a remote access policy?

What will be an ideal response?


The constraints available for use include the following:
* Authentication methods-The type of logon access, including access through a smart card
* Idle Timeout-How long a session can be idle before it is disconnected
* Session Timeout-Maximum time a user can be logged on during one session
* Called Station ID-Telephone number for the access server when a dial-up connection is used (rarely used today)
* Day and time restrictions-Days of the week and times of day when the remote access server is open to users
* NAS Port Type-Type of connection to the remote access server

Computer Science & Information Technology

You might also like to view...

The most prominent quality of an analyst is that of a(n):

A) problem solver. B) consultant. C) programmer. D) agent of change.

Computer Science & Information Technology

What are the four major guidelines an analyst should use to set-up training for a new system?

What will be an ideal response?

Computer Science & Information Technology

Which tool would a technician use to attach a new cable to a port on a network patch panel?

A) Tone generator B) Loopback plug C) Punch-down tool D) Multimeter

Computer Science & Information Technology

Choose Butt Caps for squared ends of a stroked path.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology