Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 156-215.80 All Questions

View all questions & answers for the 156-215.80 exam

Exam 156-215.80 topic 1 question 235 discussion

Actual exam question from Checkpoint's 156-215.80
Question #: 235
Topic #: 1
[All 156-215.80 Questions]

Jennifer McHanry is CEO of ACME. She recently bought her own personal iPad. She wants use her iPad to access the internal Finance Web server. Because the iPad is not a member of the Active Directory domain, she cannot identify seamlessly with AD Query. However, she can enter her AD credentials in the Captive
Portal and then get the same access as on her office computer. Her access to resources is based on rules in the R77 Firewall Rule Base.
To make this scenario work, the IT administrator must:
1) Enable Identity Awareness on a gateway and select Captive Portal as one of the Identity Sources.
2) In the Portal Settings window in the User Access section, make sure that Name and password login is selected.
3) Create a new rule in the Firewall Rule Base to let Jennifer McHanry access network destinations. Select accept as the Action.
4) Install policy.
Ms McHanry tries to access the resource but is unable. What should she do?

  • A. Have the security administrator select the Action field of the Firewall Rule ג€Redirect HTTP connections to an authentication (captive) portalג€.
  • B. Have the security administrator reboot the firewall.
  • C. Have the security administrator select Any for the Machines tab in the appropriate Access Role.
  • D. Install the Identity Awareness agent on her iPad.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
robbie_the_menace
Highly Voted 3 years, 11 months ago
Answer C is correct: https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_IdentityAwareness_AdminGuide/Topics-IDAG/Acquiring-Identities-with-Browser-Based-Authentication.htm From the Source of the rule, right-click to create an Access Role. Enter a Name for the Access Role. In the Users page, select Specific users and choose Linda Smith. In the Machines page, make sure that Any machine is selected.
upvoted 8 times
ShabVj
3 years, 3 months ago
C is the correct answer.
upvoted 2 times
...
...
pepso100
Most Recent 1 year, 11 months ago
correct answer for r77 is A correct answer for R80. is not here, bcs it was slightly change , but still it should be A
upvoted 1 times
...
babochnik
2 years, 6 months ago
Selected Answer: A
I agree with redirect to captive, but "What should she do?" :) something went wrong
upvoted 1 times
...
Gr8Deb
3 years, 10 months ago
It is A, but this is a question for R77, where the wording for enabling Captive Portal is slightly different. Option C is a default setting, so probably not required, but I believe people are specifying C because of the incorrect R80 wording for answer A.
upvoted 1 times
...
Stelloh
3 years, 11 months ago
why the answer c?
upvoted 1 times
...
nariman93
4 years, 2 months ago
https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_IdentityAwareness_AdminGuide/Content/Topics-IDAG/Acquiring-Identities-with-Browser-Based-Authentication.htm
upvoted 3 times
Stelloh
3 years, 11 months ago
what is the correct answer
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...