Term
The most common use of the Authentication Method rule component is to match _____ so internal users can be granted a higher level of access. |
|
Definition
|
|
Term
The most common use of the Authentication Method rule component is to match 802.1X authentications so internal users can be granted _____. |
|
Definition
|
|
Term
The Authentication Method rule is commonly left with the _____ setting especially in environments where 802.1X is not in use. |
|
Definition
|
|
Term
The Authentication Method rule is commonly left with the ‘Any’ setting especially in environments where 802.1X is _____. |
|
Definition
|
|
Term
A lesser used but valid use case of an Authentication Method rule component is to apply _____ based on different 802.1X types |
|
Definition
|
|
Term
User Group rule components generally apply to an end system when _____ is known. |
|
Definition
|
|
Term
User Group rule components can be applied to an end system during _____ authentication (after a user has been processed by the captive portal, or from a Kerberos authentication). |
|
Definition
|
|
Term
What type of user group rule component will match on the username that appears in the username field? |
|
Definition
|
|
Term
Username type of User Group Rule Component can use a(n) _____ to match portions of the username. |
|
Definition
|
|
Term
LDAP User Group looks for _____ for the LDAP account matching the username. |
|
Definition
|
|
Term
_____ is the only user group rule component type that is not 100% dependent upon the username of the user. |
|
Definition
|
|
Term
_____ is a user group rule componen type that is typically only used in environments where 802.1X is already deployed to a RADIUS server. |
|
Definition
|
|