What constraints are available for use in a remote access policy?
What will be an ideal response?
The constraints available for use include the following:
* Authentication methods-The type of logon access, including access through a smart card
* Idle Timeout-How long a session can be idle before it is disconnected
* Session Timeout-Maximum time a user can be logged on during one session
* Called Station ID-Telephone number for the access server when a dial-up connection is used (rarely used today)
* Day and time restrictions-Days of the week and times of day when the remote access server is open to users
* NAS Port Type-Type of connection to the remote access server
You might also like to view...
Software designed to close logical ports in your computer is known as a(n)
a. firewall. b. packet filter. c. anti-malware blocker. d. network address translator.
In creating tables, it is impossible to merge cells after you have typed in them
Indicate whether the statement is true or false