Term
As part of the visibility of an end system, ExtremeControl will attempt to profile the end system as a specific _____. |
|
Definition
|
|
Term
There are multiple methods used in identification with varying levels of confidence based on the _____. |
|
Definition
|
|
Term
If _____ assessment is used on the network, it can provide the device type depending on how much information is queried and if the client’s firewall is enabled |
|
Definition
|
|
Term
If agentless assessment is used on the network, it can provide the device type depending on how much information is queried and if the client’s _____ is enabled |
|
Definition
|
|
Term
If _____ assessment is used, it will provide detailed information about the device including the operating system and current service pack. |
|
Definition
|
|
Term
If agent-based assessment is used, it will provide detailed information about the device including the _____. |
|
Definition
operating system and current service pack |
|
|
Term
If an integration with a 3rd-party system is implemented with ExtremeManagement, there are _____ in place that can be used to update the device type. |
|
Definition
|
|
Term
_____ is the most commonly used method of Device Type Detection |
|
Definition
|
|
Term
Since DHCP Snooping is recommended for IP resolution, it is also used to detect the device type by inspecting the _____ from the client. |
|
Definition
|
|
Term
The DHCP request has unique attributes that can be used as a(n) _____ alluding to its device type |
|
Definition
|
|
Term
While DHCP fingerprints vary per _____, they can generally be used for identification with a reasonable level of accuracy. |
|
Definition
operating system and software update |
|
|
Term
DHCP fingerprints can be updated manually to support ____ devices that do not match an existing fingerprint. |
|
Definition
|
|
Term
If a device is being redirected to the Access Control’s captive portal, the _____ in the web browser can be used to profile the device. |
|
Definition
|
|