156-215.80 Exam Question 126
When you upload a package or license to the appropriate repository in SmartUpdate, where is the package or license stored
156-215.80 Exam Question 127
Which Check Point software blade provides visibility of users, groups and machines while also providing access control through identity-based policies?
156-215.80 Exam Question 128
Which of the following is an authentication method used for Identity Awareness?
156-215.80 Exam Question 129
View the rule below. What does the lock-symbol in the left column mean? Select the BEST answer.


156-215.80 Exam Question 130
Which the following type of authentication on Mobile Access can NOT be used as the first authentication method?