Which two components of a Security policy, when configured, allow third-party contractors access to internal applications outside business hours? (Choose two.)
To allow third-party contractors controlled access, security policies must combineuser identificationandtime-based access controls:
User-ID
“User-ID enables security policies to be based on user identity rather than IP addresses, ensuring precise policy enforcement for specific users such as contractors.”
(Source: User-ID Overview)
Schedule
“Schedules allow policies to be active only during specific times, providing time-based access control (e.g., after business hours).”
(Source: Security Policy Schedules)
Together, they ensure that only authorized users (contractors) have access, and only when explicitly allowed.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit