ExamGecko
Question list
Search
Search

Question 300 - 156-315.81 discussion

Report
Export

Fill in the blank: Browser-based Authentication sends users to a web page to acquire identities using ________ .

A.
User Directory
Answers
A.
User Directory
B.
Captive Portal and Transparent Kerberos Authentication
Answers
B.
Captive Portal and Transparent Kerberos Authentication
C.
Captive Portal
Answers
C.
Captive Portal
D.
UserCheck
Answers
D.
UserCheck
Suggested answer: B

Explanation:

Browser-based Authentication is a method of acquiring identities from unidentified users by sending them to a web page where they can log in and authenticate.Browser-based Authentication uses two techniques to acquire identities: Captive Portal and Transparent Kerberos Authentication1.

Captive Portal is a simple method that attempts authentication through a web interface before granting a user access to Intranet resources. When a user tries to access a protected resource, they are redirected to a web page where they have to enter their credentials. The credentials are verified by the Identity Awareness Security Gateway or an external authentication server.If the authentication is successful, the user's identity is associated with their IP address and they are allowed to access the resource12.

Transparent Kerberos Authentication is a more seamless method that leverages the existing Kerberos infrastructure in the network. When a user tries to access a protected resource, the Identity Awareness Security Gateway intercepts the Kerberos ticket request and extracts the user's identity from it. The user's identity is then associated with their IP address and they are allowed to access the resource without any additional prompts.This method requires that the Identity Awareness Security Gateway is configured as a trusted proxy in the Active Directory domain12.

Therefore, the correct answer is B) Browser-based Authentication sends users to a web page to acquire identities using Captive Portal and Transparent Kerberos Authentication.

1, THE IMPORTANCE OF ACCESS ROLES - Check Point Software, page 2

2, Browser-based Authentication Check Point - Bing

3, How to Configure Client Authentication - Check Point Software, page 1

4, Identity Sources - Check Point Software

5, Configuring Browser-Based Authentication - Check Point Software

6, Two Factor Authentication - Check Point Software

asked 16/09/2024
Andrea Tria
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first