List of questions
Related questions
Question 121 - PCNSE discussion
A network security administrator has an environment with multiple forms of authentication. There is a network access control system in place that authenticates and restricts access for wireless users, multiple Windows domain controllers, and an MDM solution for company-provided smartphones. All of these devices have their authentication events logged.
Given the information, what is the best choice for deploying User-ID to ensure maximum coverage?
A.
Syslog listener
B.
agentless User-ID with redistribution
C.
standalone User-ID agent
D.
captive portal
Your answer:
0 comments
Sorted by
Leave a comment first