ExamGecko
Question list
Search
Search

Question 597 - 156-315.81 discussion

Report
Export

Identity Awareness allows the Security Administrator to configure network access based on which of the following?

A.
Name of the application, identity of the user, and identity of the machine
Answers
A.
Name of the application, identity of the user, and identity of the machine
B.
Identity of the machine, username, and certificate
Answers
B.
Identity of the machine, username, and certificate
C.
Browser-Based Authentication, identity of a user, and network location
Answers
C.
Browser-Based Authentication, identity of a user, and network location
D.
Network location, identity of a user, and identity of a machine
Answers
D.
Network location, identity of a user, and identity of a machine
Suggested answer: D

Explanation:

Implied rules are predefined rules that are automatically added to the Access Control rulebase by the Security Management Server. Implied rules allow the control connections that are essential for the functionality and security of the Check Point products, such as communication between the Security Gateway and the Security Management Server, synchronization between cluster members, logging, VPN, and ICMP. Implied rules are not visible in the SmartConsole, but they can be viewed and modified using the Global Properties window.

The references are:

Check Point Certified Security Expert R81.20 (CCSE) Core Training, slide 12

Check Point R81 Quantum Security Gateway Guide, page 141

Check Point R81 Firewall Administration Guide, page 21

asked 16/09/2024
Liam Derwin
41 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first