ExamGecko
Question list
Search
Search

Question 590 - 156-315.81 discussion

Report
Export

An administrator wishes to enable Identity Awareness on the Check Point firewalls. However, they allow users to use company issued or personal laptops. Since the administrator cannot manage the personal laptops, which of the following methods would BEST suit this company?

A.
AD Query
Answers
A.
AD Query
B.
Terminal Servers Agent
Answers
B.
Terminal Servers Agent
C.
Identity Agents
Answers
C.
Identity Agents
D.
Browser-Based Authentication
Answers
D.
Browser-Based Authentication
Suggested answer: D

Explanation:

Browser-Based Authentication is an identity awareness method that enables you to identify users who are not authenticated by other methods, such as Active Directory or VPN. Browser-Based Authentication redirects users to a web page where they can enter their credentials and be authenticated by an external server, such as LDAP or RADIUS. After authentication, users can access the Internet and corporate resources according to the security policy rules that apply to their identity.

Browser-Based Authentication is suitable for scenarios where users can use company issued or personal laptops, since it does not require any installation or configuration on the user's device. It also supports various operating systems and browsers, and can be customized to match the company's branding.

The references are:

Check Point R81 Identity Awareness Administration Guide, page 9

Configuring Browser-Based Authentication in SmartConsole

Check Point Certified Security Expert R81.20 (CCSE) Core Training, slide 13

asked 16/09/2024
Siza Motha
30 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first