exam questions

Exam 156-215.80 All Questions

View all questions & answers for the 156-215.80 exam

Exam 156-215.80 topic 1 question 504 discussion

Actual exam question from Checkpoint's 156-215.80
Question #: 504
Topic #: 1
[All 156-215.80 Questions]

Which software blade enables Access Control policies to accept, drop, or limit web site access based on user, group, and/or machine?

  • A. Application Control
  • B. Data Awareness
  • C. Identity Awareness
  • D. Threat Emulation
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
agentjoks
Highly Voted 3 years, 1 month ago
C is the right answer
upvoted 9 times
...
[Removed]
Highly Voted 3 years, 2 months ago
Correct answer is C.
upvoted 7 times
...
ruben_mv
Most Recent 11 months, 2 weeks ago
Selected Answer: A
"Application Control and URL Filtering" are bundled in the same software blade. On the other hand, user, group, or machine could refer to local definitions and do not specify that they are user, group, or machine identities. For me, "A" is correct. --- Unified Policy https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm
upvoted 1 times
...
Hernan_Mella
1 year ago
Selected Answer: C
Without Identity Awareness you can not make an access control policy based on users computers or networks
upvoted 1 times
...
[Removed]
1 year, 2 months ago
Selected Answer: C
https://www.checkpoint.com/mind/ccsa/chapter3/ - Basing on this, it's URL Filtering...but doesn't make any sense.
upvoted 2 times
Hernan_Mella
11 months, 3 weeks ago
There are different questions, the CCSA Exam ask about application security policies [the closest is URLF], the examtopics question ask about access control policies [The closest is IA]
upvoted 1 times
...
...
Talos
1 year, 3 months ago
The _____ software blade enables Application Security policies to allow, block, or limit website access based on user, group and machine identities A. URL Filtering (*) B. Application control C. Monitoring D. Threat Emulation
upvoted 1 times
...
Lily4
1 year, 9 months ago
Introducing the Unified Access Control Policy Define one, unified Access Control Policy. The Access Control Policy lets you create a simple and granular Rule Base that combines all these Access Control features: Firewall - Control access to and from the internal network. Application Control and URL Filtering - Block applications and sites. Content Awareness - Restrict the Data Types that users can upload or download. IPsec VPN and Mobile Access - Configure secure communication with Site-to-Site and Remote Access VPNs. Identity Awareness - Identify users, computers, and networks.
upvoted 1 times
...
saicosocial
2 years, 4 months ago
Correct answer is A: An Access Control Policy Rule Base consists of these types of rules: Firewall - Control access to the internal network through different access points (gateways) Application Control and URL Filtering - Prevent malicious applications from compromising any internal company data and the internal network resources There isn't Identity Awareness in Access control policy. Read the question again.
upvoted 2 times
luismg
2 weeks, 5 days ago
it is asking for the blade, the blade is not application control itself
upvoted 1 times
...
...
babajana
2 years, 6 months ago
A is correct please read CP document
upvoted 1 times
dys
1 year, 7 months ago
Why wouldn't you reference it tough? The question states a software blade which enforces policies based on User/Groups/Networks/Machines and etc. Thus, the correct answer is C which is identity awareness.
upvoted 1 times
...
...
dirk_gentley
3 years, 2 months ago
None of these, it's URL Filtering https://www.checkpoint.com/training/ccsa/chapter3/ - question 3
upvoted 3 times
Kurp
3 years, 1 month ago
Read the question again. Which software blade enables ... identity awareness enables application control policy with identification information. C is the correct answer
upvoted 6 times
anasham
1 year, 11 months ago
Agree-> answer is C. Access roles for identity are created based on user/group, network,machine/machinegroup
upvoted 3 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago