Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 156-215.81 All Questions

View all questions & answers for the 156-215.81 exam

Exam 156-215.81 topic 1 question 207 discussion

Actual exam question from Checkpoint's 156-215.81
Question #: 207
Topic #: 1
[All 156-215.81 Questions]

An administrator wishes to enable Identity Awareness on the Check Point firewalls. However, they allow users to use company issued or personal laptops. Since the administrator cannot manage the personal laptops, which of the following methods would BEST suit this company?

  • A. AD Query
  • B. Browser-Based Authentication
  • C. Identity Agents
  • D. Terminal Servers Agent
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
mfhashmi
1 year, 3 months ago
Selected Answer: B
Correct, Browser-Based Authentication - Captive Portal Unidentified users log in with a user name and password in a Captive Portal. After authentication, the user clicks a link to go to the destination address. Recommended Usage Deployment Considerations Identity based enforcement for non-AD users (non-Windows and guest users) You can require deployment of Endpoint Identity Agents Used for identity enforcement (not intended for logging purposes).
upvoted 1 times
...
darkdante24
1 year, 5 months ago
Correct Captive portal would be ideal be used here
upvoted 1 times
...
Cedric567
1 year, 6 months ago
Selected Answer: B
correct
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...