156-215.80 Exam Question 251

Which Check Point software blade provides visibility of users, groups and machines while also providing access control through identity-based policies?
  • 156-215.80 Exam Question 252

    At what point is the Internal Certificate Authority (ICA) created?
  • 156-215.80 Exam Question 253

    On the following picture an administrator configures Identity Awareness:

    After clicking "Next" the above configuration is supported by:
  • 156-215.80 Exam Question 254

    Fill in the blank: RADIUS protocol uses ______ to communicate with the gateway.
  • 156-215.80 Exam Question 255

    Look at the screenshot below. What CLISH command provides this output?