Knowledge Quiz 14 - Basic User-ID

Ace your homework & exams now with Quizwiz!

When employing User-ID with Windows Server 2008 or later as Domain Controllers (DCs), an Active DIrectory (AD) account must be created for the firewall agent with the privilege level of at least _____.

***NOT Domain Users ***NOT WMI Users

If the User-ID agent has the proper rights to the DC's _________ log, it can read the recorded Username and IP address of successful login events.

Security

______ is a method that can be used by User-ID to find user and group information and to map those users to session source IP address(es). (Choose all that Apply)

Server Monitoring Client Probing Syslog Captive Portal

The two forms of the User-ID agent are the ________ and the ___________. (Choose all that Apply)

Standalone Software agent PAN-OS agent resident on the firewall

Port mapping for Windows/Citrix terminal servers

Terminal Services agent

Novell's LDAP Directory service

eDirectory

The User-ID agent using Server Monitoring can be using with Apple Open Directory servers and 802.1x devices.

False

When enforcing firewall policies, User-ID only identifies the user on the network and not the IP addresses of the computer the user is logged in to.

False

Gathers a list of available users and their groups from the LDAP Server

Group Mapping

User-ID can retrieve user and group information from a(n) _______.

LDAP Directory

User-ID provides full visibility of a user's network activities except when they are using which of the following devices to access the network.

None of the Above

Once User-ID is configured, user data appears as a column or a filter condition in the ______ logs. (Choose all that Apply)

Traffic Threat URL Filtering Data Filtering

Each User-ID agent, regardless of the type, can only monitor users and DCs from a single AD domain.

True

One benefit of User-ID is unknown users can be handled differently from known users to accommodate network guests.

True

One goal of the User-ID feature is to identifies the user by username and user groups instead of IP addresses and ports on the computer the user is logged into when enforcing firewall policies.

True

Maps the IP address of traffic to a username using a User-ID agent

User Mapping

Examines the client machine's locally maintained login information

WMI Probe


Related study sets

17.1 The History of Classification

View Set

Measures of Labor Underutilization

View Set

ARRT The Ovaries and Fallopian Tubes - Chapter 18 (Review Questions)

View Set

LOG 250 2WA Advanced Global Logistics

View Set

COMP 4320 - Auburn University Biaz M1-9

View Set

El terrible... There are five of us: somos 5 Aunque suene algo raro, una frase como "somos cinco" se traduce literalmente del inglés como "hay cinco de nosotros". Si dices "we are five", ten en cuenta que estás diciendo "tenemos cinco años

View Set

Aircraft Landing Gear Systems Terms

View Set