Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CheckPoint Exam 156-315.81 Topic 6 Question 55 Discussion

Actual exam question for CheckPoint's 156-315.81 exam
Question #: 55
Topic #: 6
[All 156-315.81 Questions]

Access roles allow the firewall administrator to configure network access according to:

Show Suggested Answer Hide Answer
Suggested Answer: B

Access roles are objects that define a set of users, machines, or networks that can access a specific network resource. You can create access roles based on any combination of the following criteria:

Users and user groups: You can use users and user groups from various sources, such as LDAP, RADIUS, local database, etc.

Computers or computer groups: You can use computers or computer groups that are identified by their IP address, MAC address, or hostname.

Networks: You can use networks that are defined by their IP address range, subnet mask, or gateway.

You can use access roles in the Source or Destination column of an Access Control rule to allow or deny network access based on the identity of the users, machines, or networks.

The references are:

Check Point Certified Security Expert R81.20 (CCSE) Core Training, slide 11

Check Point R81 Quantum Security Gateway Guide, page 139

Check Point R81 Identity Awareness Administration Guide, page 9


Contribute your Thoughts:

Avery
2 days ago
Hmm, I'm torn between A and B. Maybe I should just roll a dice to decide?
upvoted 0 times
...
Corinne
5 days ago
D is the way to go. User and user group-based access control is crucial for a firewall setup.
upvoted 0 times
...
Na
9 days ago
I'm not sure, but I think it could also be A) a combination of computer or computer groups and networks.
upvoted 0 times
...
Donte
10 days ago
B seems like the right choice here. It covers all the options mentioned in the question.
upvoted 0 times
Linn
5 days ago
I think B is the best choice too. It covers all the possibilities.
upvoted 0 times
...
...
Sabina
15 days ago
I agree with Lonny, because access roles are typically based on user permissions.
upvoted 0 times
...
Lonny
16 days ago
I think the answer is D) users and user groups.
upvoted 0 times
...
Allene
18 days ago
I think the answer is A. The firewall admin can configure access based on computers, groups, and networks.
upvoted 0 times
Stefany
3 days ago
I think it could also include remote access clients, not just computers and networks.
upvoted 0 times
...
Ryan
10 days ago
I agree, access roles can be configured based on computers, groups, and networks.
upvoted 0 times
...
...

Save Cancel