Okay, I think I've got this. The authenticator is responsible for actually granting or denying access, while the authentication server handles the user account database and policies. I'll go with option A.
The authenticator and authentication server work together, but I'm not sure exactly how. I'll try to eliminate the options that don't sound right and see if I can narrow it down.
Hmm, I'm a bit confused about the roles of the authenticator and authentication server. I'll need to review my notes on 802.1X to make sure I understand the difference.
Ah, I think I've got this. Configuring the correlation notable event index sounds like the right answer here. That's probably the key part of tuning correlation searches for a new ES setup.
Hmm, the DRS rules option seems interesting, but I'm not sure if that's the best approach here. I'll need to think through the implications of that recommendation and how it would work with the other options.
This seems like a straightforward project management question. I'll carefully review the inputs listed and think through which one is not an actual input to the schedule development process.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Veronique
3 months agoCory
3 months agoUla
4 months agoEmerson
4 months agoRonald
4 months agoClorinda
4 months agoMeaghan
4 months agoFlorencia
4 months agoStefany
5 months agoSalome
5 months agoTrinidad
5 months agoSabra
5 months agoShenika
5 months agoSusy
5 months agoQuentin
5 months agoIsabelle
5 months ago