ExamGecko
Question list
Search
Search

Question 212 - 156-215.81 discussion

Report
Export

An administrator wishes to enable Identity Awareness on the Check Point firewalls. However they allow users to use company issued or personal laptops. Since the administrator cannot manage the personal laptops, which of the following methods would BEST suit this company?

A.
AD Query
Answers
A.
AD Query
B.
Browser-Based Authentication
Answers
B.
Browser-Based Authentication
C.
Identity Agents
Answers
C.
Identity Agents
D.
Terminal Servers Agent
Answers
D.
Terminal Servers Agent
Suggested answer: B

Explanation:

Browser-Based Authentication is the best method for enabling Identity Awareness on the Check Point firewalls for users who use company issued or personal laptops. Browser-Based Authentication redirects users to a web page where they enter their credentials to access the network resources. This method does not require any installation or configuration on the user's device and supports any operating system and browser. AD Query is a method that queries Active Directory servers for user login events and maps them to IP addresses. This method does not work for personal laptops that are not joined to the domain. Identity Agents are software agents that run on Windows or macOS devices and provide user and machine identity information to the firewall. This method requires installation and management of the agents on each device, which may not be feasible for personal laptops. Terminal Servers Agent is a method that identifies users who connect to Windows Terminal Servers or Citrix servers via RDP or ICA protocols.This method does not apply to laptops that connect directly to the network910Reference:Identity Awareness Reference Architecture and Best Practices,Part 10 - Identity

asked 16/09/2024
Dewald Van Schalkwyk
32 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first