exam questions

Exam 156-315.80 All Questions

View all questions & answers for the 156-315.80 exam

Exam 156-315.80 topic 1 question 419 discussion

Actual exam question from Checkpoint's 156-315.80
Question #: 419
Topic #: 1
[All 156-315.80 Questions]

When Configuring Endpoint Compliance Settings for Applications and Gateways within Mobile Access, which of the three approaches will allow you to configure individual policies for each application?

  • A. Basic Approach
  • B. Strong Approach
  • C. Very Advanced Approach
  • D. Medium Approach
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Hernan_Mella
5 months, 1 week ago
This is Ok funtil R80.30 [Basic, advance, very advanced], in R80.40 the levels are basic, medium and advanced
upvoted 1 times
...
RCL_NAME
9 months, 2 weeks ago
Very Advanced Approach: Where most or every application has its own endpoint security requirements, it is possible to define an individual Endpoint Compliance policy for each application. In this scenario, there are no gateway security requirements: All users are able to access the portal. However, when clicking a link to an application, users are only allowed access if they fulfill the requirements for that application. If no requirements are configured for the application, users are allowed to access it. C is correct.
upvoted 2 times
...
Janhattal
1 year, 1 month ago
According to below link, A is the correct Answer. https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_MobileAccess_AdminGuide/html_frameset.htm?topic=documents/R80.10/WebAdminGuides/EN/CP_R80.10_MobileAccess_AdminGuide/23030
upvoted 1 times
...
NLT
1 year, 8 months ago
Basic Approach - Configuring a Common Policy for the Portal and all Applications n Medium Approach - Configuring a Threshold Policy for the Portal, Hardened for Specific Applications n Advanced Approach - Configuring Individual Policies for Each Application https://dl3.checkpoint.com/paid/5b/5b935e13beb93a7ea965e46dc3aa0747/CP_R81_MobileAccess_AdminGuide.pdf?HashKey=1621353120_36918c8e5980f63fd428640c06dded4d&xtn=.pdf
upvoted 3 times
...
GuilleGuille
1 year, 9 months ago
C is correct. Advanced Approach - Configuring Individual Policies for Each Application
upvoted 2 times
...
tochno
1 year, 9 months ago
C is correct. There are Basic Approach, Advanced Approach and Very Advanced Approach. https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_MobileAccess_AdminGuide/Content/Topics-MABG/ESOD.htm
upvoted 2 times
...
Pool_Shark0630
1 year, 10 months ago
Based on below...Strong approach should be excluded https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_MobileAccess_AdminGuide/html_frameset.htm?topic=documents/R80.10/WebAdminGuides/EN/CP_R80.10_MobileAccess_AdminGuide/23030
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago