This is a tough call, but I think the best move here is to begin executing the rollback plan. We're already past the 3-hour downtime limit set by the sponsor, and continuing to push forward could lead to even more issues. It's better to get the system back up and running, even if it means a longer downtime than originally planned.
I'm a little confused by this question. A business case could potentially be an input to several different processes. I'll have to think it through step-by-step to determine the best answer.
Okay, for unknown MAC addresses, the policy needs to be set to either pass or reject the authentication. I'm leaning towards reject since that seems like the more secure option.
I think the primary objective of the theory of constraints is to identify and manage the constraints in a system to improve overall throughput. So I'll focus on options that address that, like smooth workflow and lowered inventory levels.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Wei
4 months agoKaitlyn
4 months agoAlison
4 months agoGlenna
4 months agoElsa
5 months agoTrinidad
5 months agoPatria
5 months agoCheryl
5 months agoHelaine
5 months agoShaunna
5 months agoMary
5 months ago