Which method can capture IP-to-user mapping information for users on the Linux machines?

Users within an enterprise have been given laptops that are joined to the corporate domain. In some cases, IT has also deployed Linux-based OS systems with a graphical desktop. Information Security needs IP-to-user mapping, which it will use in group-based policies that will limit internet access for the Linux desktop users.

Which method can capture IP-to-user mapping information for users on the Linux machines?
A . You can configure Captive Portal with an authentication policy.
B . IP-to-user mapping for Linux users can only be learned if the machine is joined to the
domain.
C . You can set up a group-based security policy to restrict internet access based on group membership
D . You can deploy the User-ID agent on the Linux desktop machines

Answer: D

Latest PCNSE Dumps Valid Version with 280 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments