Term
The ExtremeControl solution provides _____, location, and user identity across the entire edge of the network. |
|
Definition
|
|
Term
One of the three major components of the ExtremeControl solution is the use of _____ ExtemeManagement Server(s). |
|
Definition
|
|
Term
One of the three major components of the ExtremeControl solution is the use of _____ Access Control Engine(s) |
|
Definition
|
|
Term
Is an Access Control Engine physical or virtual? |
|
Definition
It can be either physical or virtual. |
|
|
Term
One of the three major components of the ExtremeControl solution is the use of _____ intelligent networking device(s). |
|
Definition
|
|
Term
Based on a logic-based rules engine, users and devices can be _____, profiled, and granted different access rights. |
|
Definition
|
|
Term
Which implementation use case allows for keeping track of all user activity from a network location perspective? |
|
Definition
|
|
Term
Which implementation use case allows users with a valid username and password to authenticate on the network using personal devices? |
|
Definition
Bring Your Own Device (BYOD) |
|
|
Term
Which implementation use case allows for dynamic access for different types of users? |
|
Definition
|
|
Term
Which implementation use case allows for verifing the integrity of an end system before it is granted full access to the network? |
|
Definition
|
|
Term
With End System Visibility, ExtremeControl will keep a detailed _____ of an end system, where it has been, which users have logged into it, and if that end system has changed. |
|
Definition
|
|
Term
With End System Visibility, addition to auditing capabilities, _____ can be configured based on the information gathered. |
|
Definition
|
|
Term
With BYOD, users can be given a higher level of access than typical guest users, but less than when using corporate assets based on the fact that _____ but the devices they are connecting from are not. |
|
Definition
|
|
Term
With Guest Access, ExtremeControl can employ _____ to ensure information provided by the users is legitimate. |
|
Definition
|
|
Term
If an end system is not compliant when requesting access to the network, a _____ can be provided allowing the user to conform to the network requirements without the need of IT assistance. |
|
Definition
|
|
Term
The ExtremeControl solution provides visibility, _____, and user identity across the entire edge of the network. |
|
Definition
|
|
Term
The ExtremeControl solution provides visibility, location, and _____ across the entire edge of the network. |
|
Definition
|
|
Term
Based on a logic-based rules engine, users and devices can be identified, ____, and granted different access rights. |
|
Definition
|
|
Term
Based on a logic-based rules engine, users and devices can be identified, profiled, and _____. |
|
Definition
granted different access rights |
|
|