exam questions

Exam 156-215.80 All Questions

View all questions & answers for the 156-215.80 exam

Exam 156-215.80 topic 1 question 448 discussion

Actual exam question from Checkpoint's 156-215.80
Question #: 448
Topic #: 1
[All 156-215.80 Questions]

Access roles allow the firewall administrator to configure network access according to:

  • A. a combination of computer groups and networks
  • B. users and user groups
  • C. all of the above
  • D. remote access clients
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️
To create an access role:
1. Select Users and Administrators in the Objects Tree.
2. Right-click Access Roles > New Access Role.
The Access Role window opens.
3. Enter a Name and Comment (optional) for the access role.
4. In the Networks tab, select one of these:
✑ Any network
✑ Specific networks - Click the plus sign and select a network.
Your selection is shown in the Networks node in the Role Preview pane.
5. In the Users tab, select one of these:
✑ Any user
✑ All identified users - Includes users identified by a supported authentication method (internal users, AD users or LDAP users).
✑ Specific users - Click the plus sign.
A window opens. You can search for Active Directory entries or select them from the list.
6. In the Machines tab, select one of these:
✑ Any machine
✑ All identified machines - Includes machines identified by a supported authentication method (AD).
✑ Specific machines - Click the plus sign.
You can search for AD entries or select them from the list.
7. Optional: For computers that use Full Identity Agents, from the Machines tab select Enforce IP spoofing protection.
8. Click OK.
The access role is added to the Users and Administrators tree.
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_Firewall_WebAdmin/92705.htm

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
babochnik
3 months ago
Selected Answer: C
Access Role Objects In SmartConsole, you can create Access Role objects to define users, computers and network locations as one object. You can use Access Role objects as a source or a destination parameter in a rule. Access Role objects can include one or more of these objects: - Networks - Users and user groups - Computers and computer groups - Remote Access Clients and "Creating Access Roles" p.42-43 https://dl3.checkpoint.com/paid/3f/3f771245354ce0c9670fd4abc9626bfd/CP_R80.40_IdentityAwareness_AdminGuide.pdf?HashKey=1653558795_f08af59b0d3d20e5b92379ebcf143612&xtn=.pdf https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_IdentityAwareness_AdminGuide/Topics-IDAG/Configuring-Identity-Awareness-Creating-Access-Roles.htm
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago