Shared Flashcard Set

Details

Edge ExtremeControl Solution 01
Overview
19
Computer Networking
Professional
06/10/2020

Additional Computer Networking Flashcards

 


 

Cards

Term
The ExtremeControl solution provides _____, location, and user identity across the entire edge of the network.
Definition
visibility
Term
One of the three major components of the ExtremeControl solution is the use of _____ ExtemeManagement Server(s).
Definition
one
Term
One of the three major components of the ExtremeControl solution is the use of _____ Access Control Engine(s)
Definition
one or more
Term
Is an Access Control Engine physical or virtual?
Definition
It can be either physical or virtual.
Term
One of the three major components of the ExtremeControl solution is the use of _____ intelligent networking device(s).
Definition
one or more
Term
Based on a logic-based rules engine, users and devices can be _____, profiled, and granted different access rights.
Definition
identified
Term
Which implementation use case allows for keeping track of all user activity from a network location perspective?
Definition
End System Visibility
Term
Which implementation use case allows users with a valid username and password to authenticate on the network using personal devices?
Definition
Bring Your Own Device (BYOD)
Term
Which implementation use case allows for dynamic access for different types of users?
Definition
Guest Access
Term
Which implementation use case allows for verifing the integrity of an end system before it is granted full access to the network?
Definition
End System Compliance
Term
With End System Visibility, ExtremeControl will keep a detailed _____ of an end system, where it has been, which users have logged into it, and if that end system has changed.
Definition
audit log
Term
With End System Visibility, addition to auditing capabilities, _____ can be configured based on the information gathered.
Definition
notifications and alarms
Term
With BYOD, users can be given a higher level of access than typical guest users, but less than when using corporate assets based on the fact that _____ but the devices they are connecting from are not.
Definition
the users are trusted
Term
With Guest Access, ExtremeControl can employ _____ to ensure information provided by the users is legitimate.
Definition
validation mechanisims
Term
If an end system is not compliant when requesting access to the network, a _____ can be provided allowing the user to conform to the network requirements without the need of IT assistance.
Definition
self-remediation portal
Term
The ExtremeControl solution provides visibility, _____, and user identity across the entire edge of the network.
Definition
location
Term
The ExtremeControl solution provides visibility, location, and _____ across the entire edge of the network.
Definition
user identity
Term
Based on a logic-based rules engine, users and devices can be identified, ____, and granted different access rights.
Definition
profiled
Term
Based on a logic-based rules engine, users and devices can be identified, profiled, and _____.
Definition
granted different access rights
Supporting users have an ad free experience!