Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CheckPoint Exam 156-315.81 Topic 12 Question 35 Discussion

Actual exam question for CheckPoint's 156-315.81 exam
Question #: 35
Topic #: 12
[All 156-315.81 Questions]

Which type of Endpoint Identity Agent includes packet tagging and computer authentication?

Show Suggested Answer Hide Answer
Suggested Answer: A

The type of Endpoint Identity Agent that includes packet tagging and computer authentication is Full. Packet tagging is a feature that allows the Endpoint Identity Agent to add a tag to the packets sent by the user's device, which contains the user's identity information. This way, the Security Gateway can identify the user without requiring additional authentication methods. Computer authentication is a feature that allows the Endpoint Identity Agent to authenticate the user's device using a certificate, which ensures that only authorized devices can access the network resources. The Full Endpoint Identity Agent supports both packet tagging and computer authentication, as well as other features such as Single Sign-On (SSO), Multi-Factor Authentication (MFA), and VPN.

The references are:

Check Point R81 Identity Awareness Administration Guide, page 15

Endpoint Identity Agent - Check Point CheckMates

Check Point Identity Agent - All flavors for Windows OS in a single package (Full, Light, v1 and v2 for Terminal Server)


Contribute your Thoughts:

0/500 words
Daron
5 days ago
I thought it was C, the Light agent.
upvoted 0 times
...
Minna
11 days ago
It's definitely A, the Full agent.
upvoted 0 times
...
Gearldine
17 days ago
I thought Light was more about minimal features, so I doubt it's C. Full seems like the right choice, but I could be wrong.
upvoted 0 times
...
Barrie
22 days ago
I’m leaning towards D, Complete, but I’m not confident. I just remember that it has to do with authentication.
upvoted 0 times
...
Marica
28 days ago
I feel like we covered something similar in practice questions, but I can't recall the specifics. Maybe it's Custom?
upvoted 0 times
...
Elena
1 month ago
I think the answer might be A, Full, but I'm not completely sure. I remember packet tagging being a key feature.
upvoted 0 times
...
Sherill
1 month ago
A seems like the most logical choice based on the question. Packet tagging and computer authentication are core Endpoint Identity Agent capabilities.
upvoted 0 times
...
Linsey
1 month ago
I'm leaning towards D. Complete Endpoint Identity Agent, since that sounds like it would have the most comprehensive set of features.
upvoted 0 times
...
Jaime
1 month ago
Hmm, I'm a bit confused on the differences between the Endpoint Identity Agent types. I'll need to review the material on that.
upvoted 0 times
...
Lynette
1 month ago
I'm pretty sure the answer is A. Full Endpoint Identity Agent includes packet tagging and computer authentication.
upvoted 0 times
...
Devora
1 month ago
The key here is looking for the Endpoint Identity Agent that includes both packet tagging and computer authentication. I think that narrows it down to A or D.
upvoted 0 times
...
Elmira
1 month ago
Hmm, I'm a bit unsure on this one. I'll have to think it through carefully.
upvoted 0 times
...
Kayleigh
1 month ago
Hmm, I'm a bit confused on the scope of the internal audit activity's role in CSR. I'll need to think through each option carefully to identify the right answer.
upvoted 0 times
...
Claribel
1 month ago
I'm feeling pretty confident about this one. The code is trying to write to a file that doesn't exist, so it should generate a runtime error. I'll select that option.
upvoted 0 times
...
Kandis
2 months ago
I'm a bit confused on this one. I know Secure Boot and BitLocker, but I'm not familiar with the encryption options specifically for Windows Phone 8.1. Guess I'll have to make an educated guess.
upvoted 0 times
...
Herman
1 year ago
I've heard that C) Light is the most popular choice for ease of use.
upvoted 0 times
...
Stevie
1 year ago
I'm leaning towards B) Custom because it offers more flexibility.
upvoted 0 times
...
Dominga
1 year ago
I disagree, I believe it's D) Complete.
upvoted 0 times
...
Johna
1 year ago
I think the answer is A) Full.
upvoted 0 times
...
Phung
2 years ago
Hmm, that's a valid point. D) Complete could also be the correct answer.
upvoted 0 times
...
Helaine
2 years ago
I see your point, but I think D) Complete makes more sense for this scenario.
upvoted 0 times
...
Weldon
2 years ago
I disagree, I believe it's C) Light because of the packet tagging and computer authentication.
upvoted 0 times
...
Phung
2 years ago
I think the answer is A) Full.
upvoted 0 times
...

Save Cancel