Which of the following objects is a valid source in an authentication rule?

Which of the following objects is a valid source in an authentication rule?

Which of the following objects is a valid source in an authentication rule?

A.
User@Network

B.
Host@Any

C.
User@Any

D.
User_group@Network

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *