Users within an enterprise have been given laptops that are joined to the corporate domain.
In some cases, IT has also deployed Linux-based OS systems with a graphical desktop.
Information Security needs IP-to-user mapping, which it will use in group-based policies that will limit internet access for the Linux desktop users.
Which method can capture IP-to-user mapping information for users on the Linux machines?
A . You can configure Captive Portal with an authentication policy.
B . IP-to-user mapping for Linux users can only be learned if the machine is joined to the domain.
C . You can set up a group-based security policy to restrict internet access based on group membership
D . You can deploy the User-ID agent on the Linux desktop machines
Answer: D
Latest PCNSE Dumps Valid Version with 280 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund