Notifications
Clear all
Topic starter
20/05/2022 7:58 pm
What would allow a network security administrator to authenticate and identify a user with a new BYOD-type device that is not joined to the corporate domain?
- A . a Security policy with "known-user” selected in the Source User field
- B . an Authentication policy with "known-user” selected in the Source User field
- C . an Authentication policy with 'unknown' selected in the Source User field
- D . a Security policy with “unknown” selected in the Source User field
Suggested Answer: C