exam questions

Exam 156-215.80 All Questions

View all questions & answers for the 156-215.80 exam

Exam 156-215.80 topic 1 question 202 discussion

Actual exam question from Checkpoint's 156-215.80
Question #: 202
Topic #: 1
[All 156-215.80 Questions]

Which rule is responsible for the user authentication failure?

  • A. Rule 4
  • B. Rule 6
  • C. Rule 3
  • D. Rule 5
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
zorolo
4 months ago
From CCSA Manual: “Connections that need to be made directly to the gateway, such as Client Authentication, encryption, and Content Vectoring Protocol (CVP) rules, always go above the Stealth rule.” (“The Rule Base” section, “Cleanup and Stealth Rules”).
upvoted 3 times
...
mauchi
1 year, 6 months ago
This is how I understand it: the authentication rule is undoubtedly rule 4 (user auth --- User Authentication allows you to provide authentication for five different services: Telnet, rlogin, HTTP, HTTPS, and FTP.). By the rulebase we guess that specifically for http on the server is how we will want the user to authenticate to destination server webSingapore. This means that the fw will intercept this http authentication to the server, and (i suppose) will redirect us to a fw-1 http window where to authenticate. This exactly matches the condition on rule 4, because now we will be connecting to the fw, so it will drop this and so the redirection to http on the fwsingapore wont appear and we wont be able to authenticate through the fw and therefore also not with our destination server.
upvoted 4 times
...
Snir
1 year, 11 months ago
C is the correct answer! http://etutorials.org/Networking/Check+Point+FireWall/Chapter+8.+User+Authentication/How+Users+Authenticate/
upvoted 3 times
DrTee
1 year, 11 months ago
Definitely agree. Rule 3 prevents the user auth rule from being matched.
upvoted 3 times
...
...
rhaphaexzzux
2 years, 4 months ago
Any explanation ?
upvoted 3 times
Kurp
2 years, 3 months ago
User auth requires displaying the captive portal from the security gateway which gets blocked by the stealth rule . Your auth rule must be above that.
upvoted 8 times
...
Nickname_00
2 years, 4 months ago
Under Rule 2 the traffic was accepted but under 3 it gets dropped, hence it doesn't even reach the Rule 4.
upvoted 1 times
C4rlos
2 years, 3 months ago
That makes no sense. If the traffic is accepted by rule 2, then it can't be dropped by rule 3. I don't see any issue here, to be honest. This is user authentication (not client authentication), so there is no need to authenticate directly to the security gateway. Hence stealth rule is not an issue.
upvoted 4 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago