What constraints are available for use in a remote access policy?

What will be an ideal response?

The constraints available for use include the following:
* Authentication methods-The type of logon access, including access through a smart card
* Idle Timeout-How long a session can be idle before it is disconnected
* Session Timeout-Maximum time a user can be logged on during one session
* Called Station ID-Telephone number for the access server when a dial-up connection is used (rarely used today)
* Day and time restrictions-Days of the week and times of day when the remote access server is open to users
* NAS Port Type-Type of connection to the remote access server

Computer Science & Information Technology

You might also like to view...

Software designed to close logical ports in your computer is known as a(n)

a. firewall. b. packet filter. c. anti-malware blocker. d. network address translator.

Computer Science & Information Technology

In creating tables, it is impossible to merge cells after you have typed in them

Indicate whether the statement is true or false

Computer Science & Information Technology