Term
| As part of the visibility of an end system, ExtremeControl will attempt to profile the end system as a specific _____. |
|
Definition
|
|
Term
| There are multiple methods used in identification with varying levels of confidence based on the _____. |
|
Definition
|
|
Term
| If _____ assessment is used on the network, it can provide the device type depending on how much information is queried and if the client’s firewall is enabled |
|
Definition
|
|
Term
| If agentless assessment is used on the network, it can provide the device type depending on how much information is queried and if the client’s _____ is enabled |
|
Definition
|
|
Term
| If _____ assessment is used, it will provide detailed information about the device including the operating system and current service pack. |
|
Definition
|
|
Term
| If agent-based assessment is used, it will provide detailed information about the device including the _____. |
|
Definition
| operating system and current service pack |
|
|
Term
| If an integration with a 3rd-party system is implemented with ExtremeManagement, there are _____ in place that can be used to update the device type. |
|
Definition
|
|
Term
| _____ is the most commonly used method of Device Type Detection |
|
Definition
|
|
Term
| Since DHCP Snooping is recommended for IP resolution, it is also used to detect the device type by inspecting the _____ from the client. |
|
Definition
|
|
Term
| The DHCP request has unique attributes that can be used as a(n) _____ alluding to its device type |
|
Definition
|
|
Term
| While DHCP fingerprints vary per _____, they can generally be used for identification with a reasonable level of accuracy. |
|
Definition
| operating system and software update |
|
|
Term
| DHCP fingerprints can be updated manually to support ____ devices that do not match an existing fingerprint. |
|
Definition
|
|
Term
| If a device is being redirected to the Access Control’s captive portal, the _____ in the web browser can be used to profile the device. |
|
Definition
|
|