Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 156-215.81 All Questions

View all questions & answers for the 156-215.81 exam

Exam 156-215.81 topic 1 question 147 discussion

Actual exam question from Checkpoint's 156-215.81
Question #: 147
Topic #: 1
[All 156-215.81 Questions]

Which software blade enables Access Control policies to accept, drop, or limit web site access based on user, group, and/or machine?

  • A. Application Control
  • B. Threat Emulation
  • C. Data Awareness
  • D. Identity Awareness
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Aldrich_Ling
1 year ago
Selected Answer: D
You can use these elements as matching criteria in the Source and Destination fields of the Access Control policy rules: The identity of users or user groups The identity of computers or computer groups https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_IdentityAwareness_AdminGuide/Topics-IDAG/Introduction-to-Identity-Awareness.htm
upvoted 1 times
...
Nando0505
1 year, 1 month ago
Selected Answer: A
A. Application Control https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SecurityManagement_AdminGuide/Topics-SECMG/Creating-Application-Control-and-URL-Filtering-Rules.htm?Highlight=Application%20Control
upvoted 1 times
...
chaffer
1 year, 3 months ago
Selected Answer: A
A is the one
upvoted 1 times
...
mfhashmi
1 year, 3 months ago
Selected Answer: A
The correct awnser is A, https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SecurityManagement_AdminGuide/Topics-SECMG/Creating-Application-Control-and-URL-Filtering-Rules.htm?Highlight=Application%20Control
upvoted 1 times
dfigo
1 year, 3 months ago
On your URL it also says "If you enable Identity Awareness on a Security Gateway, you can use it together with Application Control to make rules that apply to an access role. Use access role objects to define users, machines, and network locations as one object."
upvoted 3 times
...
...
darkboy32
1 year, 3 months ago
Selected Answer: A
A is the one
upvoted 1 times
...
darkdante24
1 year, 5 months ago
Selected Answer: D
Identity awareness, look for the key words users, machines, and network locations
upvoted 4 times
...
luismg
1 year, 5 months ago
Selected Answer: D
how can you create those policies whtout identity awareness, for me the answer is D
upvoted 1 times
...
luismg
1 year, 5 months ago
Selected Answer: A
It is application control. A
upvoted 1 times
...
bigfootqp
1 year, 5 months ago
Selected Answer: A
Application Control is the correct answer
upvoted 1 times
...
yuop
1 year, 11 months ago
correct. https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_SecurityManagement_AdminGuide/html_frameset.htm?topic=documents/R80.30/WebAdminGuides/EN/CP_R80.30_SecurityManagement_AdminGuide/136972
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...