Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 156-586 All Questions

View all questions & answers for the 156-586 exam

Exam 156-586 topic 1 question 31 discussion

Actual exam question from Checkpoint's 156-586
Question #: 31
Topic #: 1
[All 156-586 Questions]

What are the three main component of Identity Awareness?

  • A. User, Active Directory and Access Role
  • B. Identity Awareness Blade on Security Gateway, User Database on Security Management Server and Active Directory
  • C. Identity Source, Identity Server (PDP) and Identity Enforcement (PEP)
  • D. Client, SMS and Secure Gateway
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Obreroangel
8 months, 4 weeks ago
The question is for Three components, NOT 2. It's A the best option
upvoted 1 times
...
Anth0ny
9 months, 3 weeks ago
Selected Answer: C
Based on this sk. it should be C https://support.checkpoint.com/results/sk/sk97638
upvoted 1 times
...
Sakan
11 months ago
Selected Answer: C
Identity Sources determine how the Identity Awareness Security Gateway learns the user names and computers that generate traffic on the network. The PEP and PDP processes are the other key components of the system. Through them, administrators control user access and network protection.
upvoted 4 times
...
z8d21oczd
11 months ago
Selected Answer: C
I think C is correct When configured, policy decision and enforcement is handled by the Identity Awareness Policy Decision Point (PDP) and Policy Enforcement Point (PEP). The basic workflow is: 1. An identity source acquires the identity (for example, username or computer) and associated IP address and sends this information to the PDP, which resides on a Check Point machine. 2. The PDP uses relevant user sources (LDAP / RADIUS / Internal DB) and runs authorization requests and group lookups on the ID to match Access Roles. 3. The PDP sends the identify information to the enforcing Security Gateway's PEP over a SIC connection. The PEP might be on the same Gateway or a different server. 4. The PEP enforces the traffic accordingly; for example, redirecting users to Captive Portal.
upvoted 3 times
...
gsvit
11 months, 1 week ago
Best Answer "A" Pg. 318 CCTE R80.20 "Identity Awareness uses the source and destination IP addresses of network traffic to identify users and computers. You can use these elements, bundled into an access role object, as matching criteria in the Source and Destination fields of Access Control policy rules"
upvoted 1 times
...
erickmga
11 months, 2 weeks ago
The Answer is "A", Kortex page 183 CCTE
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...