Which two components of a Security policy, when configured, allow third-party contractors access to internal applications outside business hours? (Choose two.)
To allowthird-party contractors access to internal applications outside business hours, theSecurity Policymust include:
User-ID–
Identifies specific users (e.g., third-party contractors) and applies access rules accordingly.
Ensures that onlyauthenticated usersfrom the contractor group receive access.
Schedule–
Specifies theallowed access time frame(e.g., outside business hours:6 PM - 6 AM).
Ensures that contractorscan only access applications during designated off-hours.
C. Service❌
Incorrect, becauseService defines ports and protocols, not user identity or time-based access control.
D. App-ID❌
Incorrect, becauseApp-ID identifies and classifies applications, but doesnot restrict access based on user identity or time.
Firewall Deployment– Ensurescontractors access internal applications securelyvia User-ID and Schedule.
Security Policies– Implementsgranular time-based and identity-based access control.
VPN Configurations– Third-party contractors may access applicationsthrough GlobalProtect VPN.
Threat Prevention– Reduces attack risks by limitingaccess windows for third-party users.
WildFire Integration– Ensures downloaded contractor files are scanned for threats.
Zero Trust Architectures– Supportsleast-privilege access based on user identity and time restrictions.
Why Other Options Are Incorrect?References to Firewall Deployment and Security Features:Thus, the correct answers are:✅A. User-ID✅B. Schedule
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit