What would allow a network security administrator to authenticate and identify a user with a new BYOD-type device that is not joined to the corporate domain?
A.
a Security policy with 'known-user' selected in the Source User field
B.
a Security policy with 'unknown' selected in the Source User field
C.
an Authentication policy with 'known-user' selected in the Source User field
D.
an Authentication policy with 'unknown' selected in the Source User field
Whenever a user requests a resource, the firewall evaluates Authentication policy. Based on the matching policy rule, the firewall then prompts the user to respond to one or more challenges of different factors (types), such as login and password, voice, SMS, push, or one-time password (OTP) authentication. After the user responds to all the factors, the firewall evaluates Security policy (see Policies > Security) to determine whether to allow access to the resource.
Select the source users or user groups to which the rule applies:
any—Includes any traffic regardless of source user.
pre-logon—Includes remote users who are not logged into their client systems but whose client systems connect to the network through the GlobalProtect pre-logon feature .
known-user—Includes all users for whom the firewall already has IP address-to-username mappings before the rule evokes authentication.
unknown—Includes all users for whom the firewall does not have IP address-to-username mappings. After the rule evokes authentication, the firewall creates user mappings for unknown users based on the usernames they entered.
Select—Includes only the users and user groups that you Add to the Source User list.
D
unknown—Includes all users for whom the firewall does not have IP address-to-username mappings. After the rule evokes authentication, the firewall creates user mappings for unknown users based on the usernames they entered.
Seems D is correct, as authentication policy with with the "Unknown", as
unknown—Includes all users for whom the firewall does not have IP address-to-username mappings. After the rule evokes authentication, the firewall creates user mappings for unknown users based on the usernames they entered.
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-web-interface-help/policies/policies-authentication/building-blocks-of-an-authentication-policy-rule
upvoted 3 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
blahblah1234567890000
2Â months, 2Â weeks agoblahblah1234567890000
2Â months, 2Â weeks agoconfusion
8Â months, 3Â weeks agoTAKUM1y
9Â months agobimyo
10Â months ago