ExamGecko
Question list
Search
Search

Question 592 - 156-315.81 discussion

Report
Export

Access roles allow the firewall administrator to configure network access according to:

A.
a combination of computer or computer groups and networks.
Answers
A.
a combination of computer or computer groups and networks.
B.
All of the above.
Answers
B.
All of the above.
C.
remote access clients.
Answers
C.
remote access clients.
D.
users and user groups.
Answers
D.
users and user groups.
Suggested answer: B

Explanation:

Access roles are objects that define a set of users, machines, or networks that can access a specific network resource. You can create access roles based on any combination of the following criteria:

Users and user groups: You can use users and user groups from various sources, such as LDAP, RADIUS, local database, etc.

Computers or computer groups: You can use computers or computer groups that are identified by their IP address, MAC address, or hostname.

Networks: You can use networks that are defined by their IP address range, subnet mask, or gateway.

You can use access roles in the Source or Destination column of an Access Control rule to allow or deny network access based on the identity of the users, machines, or networks.

The references are:

Check Point Certified Security Expert R81.20 (CCSE) Core Training, slide 11

Check Point R81 Quantum Security Gateway Guide, page 139

Check Point R81 Identity Awareness Administration Guide, page 9

asked 16/09/2024
Kong Yew Kuen
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first