"Application Control and URL Filtering" are bundled in the same software blade. On the other hand, user, group, or machine could refer to local definitions and do not specify that they are user, group, or machine identities. For me, "A" is correct.
---
Unified Policy
https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm
There are different questions, the CCSA Exam ask about application security policies [the closest is URLF], the examtopics question ask about access control policies [The closest is IA]
The _____ software blade enables Application Security policies to allow, block, or limit website access based on user, group and machine identities
A. URL Filtering (*)
B. Application control
C. Monitoring
D. Threat Emulation
Introducing the Unified Access Control Policy
Define one, unified Access Control Policy. The Access Control Policy lets you create a simple and granular Rule Base that combines all these Access Control features:
Firewall - Control access to and from the internal network.
Application Control and URL Filtering - Block applications and sites.
Content Awareness - Restrict the Data Types that users can upload or download.
IPsec VPN and Mobile Access - Configure secure communication with Site-to-Site and Remote Access VPNs.
Identity Awareness - Identify users, computers, and networks.
Correct answer is A:
An Access Control Policy Rule Base consists of these types of rules:
Firewall - Control access to the internal network through different access points (gateways)
Application Control and URL Filtering - Prevent malicious applications from compromising any internal company data and the internal network resources
There isn't Identity Awareness in Access control policy. Read the question again.
Why wouldn't you reference it tough?
The question states a software blade which enforces policies based on User/Groups/Networks/Machines and etc.
Thus, the correct answer is C which is identity awareness.
Read the question again. Which software blade enables ... identity awareness enables application control policy with identification information. C is the correct answer
Agree-> answer is C. Access roles for identity are created based on user/group, network,machine/machinegroup
upvoted 3 times
...
...
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
agentjoks
Highly Voted 4 years, 6 months ago[Removed]
Highly Voted 4 years, 7 months agoruben_mv
Most Recent 2 years, 4 months agoHernan_Mella
2 years, 4 months ago[Removed]
2 years, 7 months agoHernan_Mella
2 years, 4 months agoTalos
2 years, 8 months agoLily4
3 years, 2 months agosaicosocial
3 years, 9 months agoluismg
1 year, 5 months agobabajana
3 years, 11 months agodys
3 years agodirk_gentley
4 years, 7 months agoKurp
4 years, 6 months agoanasham
3 years, 4 months ago