List of questions
Related questions
Question 249 - H12-731_V2.0 discussion
The following describes user authentication Which ones are correct? (multiple selection).
A.
Users whose security policies are allowed but whose identity authentication is not passed cannot access resources normally
B.
If the user is a MAC address single-item bound user Other users can also use this MAC address to log in normally.
C.
Users with two-way iP/MAC binding can obtain dynamic IP address o through DHCP
D.
Configure two-way binding of MAC addresses for a user to be exempt from authentication? If there are three layers of device elbows between the user and FW, the user can go online normally
Your answer:
0 comments
Sorted by
Leave a comment first