Criado por Rick Schoenman
aproximadamente 2 anos atrás
|
||
Questão | Responda |
To establish fine-grained control of the IPAM implementation, RBAC can be used. Which 3 layers of configuration can be managed using RBAC? | - Roles - Access Scopes - Access Policies |
Describe an IPAM RBAC Role | A role is a collection of IPAM operations. 9 roles are built-in, but custom ones can be created |
Describe an IPAM RBAC Access Scope | An Access Scope determines the objects to which a user has access to. the 'Global' Access Scope, grants access to all objects in IPAM. |
Describe an IPAM RBAC Access Policy | An Access Policy combines a Role with a Access Scope. |
There is a table listing the 9 IPAM security groups. | . |
Quer criar seus próprios Flashcards gratuitos com GoConqr? Saiba mais.