BlackFriday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CheckPoint Exam 156-315.81 Topic 12 Question 35 Discussion

Actual exam question for CheckPoint's 156-315.81 exam
Question #: 35
Topic #: 12
[All 156-315.81 Questions]

Which type of Endpoint Identity Agent includes packet tagging and computer authentication?

Show Suggested Answer Hide Answer
Suggested Answer: A

The type of Endpoint Identity Agent that includes packet tagging and computer authentication is Full. Packet tagging is a feature that allows the Endpoint Identity Agent to add a tag to the packets sent by the user's device, which contains the user's identity information. This way, the Security Gateway can identify the user without requiring additional authentication methods. Computer authentication is a feature that allows the Endpoint Identity Agent to authenticate the user's device using a certificate, which ensures that only authorized devices can access the network resources. The Full Endpoint Identity Agent supports both packet tagging and computer authentication, as well as other features such as Single Sign-On (SSO), Multi-Factor Authentication (MFA), and VPN.

The references are:

Check Point R81 Identity Awareness Administration Guide, page 15

Endpoint Identity Agent - Check Point CheckMates

Check Point Identity Agent - All flavors for Windows OS in a single package (Full, Light, v1 and v2 for Terminal Server)


Contribute your Thoughts:

Herman
5 months ago
I've heard that C) Light is the most popular choice for ease of use.
upvoted 0 times
...
Stevie
5 months ago
I'm leaning towards B) Custom because it offers more flexibility.
upvoted 0 times
...
Dominga
5 months ago
I disagree, I believe it's D) Complete.
upvoted 0 times
...
Johna
5 months ago
I think the answer is A) Full.
upvoted 0 times
...
Phung
6 months ago
Hmm, that's a valid point. D) Complete could also be the correct answer.
upvoted 0 times
...
Helaine
6 months ago
I see your point, but I think D) Complete makes more sense for this scenario.
upvoted 0 times
...
Weldon
6 months ago
I disagree, I believe it's C) Light because of the packet tagging and computer authentication.
upvoted 0 times
...
Phung
6 months ago
I think the answer is A) Full.
upvoted 0 times
...

Save Cancel