Term
_____ rule components tend to be the most commonly used rule components within the rules engine |
|
Definition
|
|
Term
End System Group rule components are used to match the physical end system versus the ______ attached to the end system |
|
Definition
|
|
Term
These groups are commonly used for printers, voice over IP (VoIP) phones, and as whitelist and blacklist groups to _____ any existing rules. |
|
Definition
|
|
Term
There are _____ types of End System Groups that can be created. |
|
Definition
|
|
Term
MAC Address – An end system group can be created to match a full MAC address, a MAC prefix (MAC OUI), or a _____. |
|
Definition
|
|
Term
It’s quite common to create an empty end system group based on a full MAC as a _____. |
|
Definition
|
|
Term
It's common to use a _____ to match a vendor for printers or phones. |
|
Definition
|
|
Term
IP Address – An end system group can be created to match the IP address or subnet of an end system. This is common when creating rules for devices residing on a specific _____. |
|
Definition
|
|
Term
A hostname end system group is dependent upon the hostname field of the end system being ____. |
|
Definition
|
|
Term
When an end system matches the combination of rule components defined in a rule, the resulting output is an _____. |
|
Definition
|
|
Term
An Access Control Profile defines the _____ a device is assigned. |
|
Definition
|
|
Term
The _____ is a container to define the policy mappings that should be returned to an end system. |
|
Definition
|
|
Term
The most common use of an Access Control Profile is to define the _____ used for the end system |
|
Definition
|
|
Term
If assessment is used on the network, the Access Control Profile will also define an assessment configuration which contains a grouping of _____. |
|
Definition
|
|