New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

PDF 156-315.77 Study Guide

Page: 24 / 25
Total 754 questions

Check Point Certified Security Expert Questions and Answers

Question 93

In the following cluster configuration; if you reboot sglondon_1 which device will be active when sglondon_1 is back up and running? Why?

Options:

A.

sglondon_1 because it the first configured object with the lowest IP.

B.

sglondon_2 because sglondon_1 has highest IP.

C.

sglondon_1, because it is up again, sglondon_2 took over during reboot.

D.

sglondon_2 because it has highest priority.

Question 94

If using AD Query for seamless identity data reception from Microsoft Active Directory (AD), which of the following methods is NOT Check Point recommended?

Options:

A.

Identity-based enforcement for non-AD users (non-Windows and guest users)

B.

Basic identity enforcement in the internal network

C.

Leveraging identity in Internet application control

D.

Identity-based auditing and logging

Question 95

Which is NOT a method through which Identity Awareness receives its identities?

Options:

A.

AD Query

B.

Group Policy

C.

Identity Agent

D.

Captive Portal

Question 96

When using Captive Portal to send unidentified users to a Web portal for authentication, which of the following is NOT a recommended use for this method?

Options:

A.

For deployment of Identity Agents

B.

Identity-based enforcement for non-AD users (non-Windows and guest users)

C.

Leveraging identity in Internet application control

D.

Basic identity enforcement in the internal network

Page: 24 / 25
Total 754 questions