However they allow users to use company issued or personal laptops. Since the administrator cannot manage the personal laptops, which of the following methods would BEST suit this company?

Posted by: Pdfprep Category: 156-215.80 Tags: , ,

An administrator wishes to enable Identity Awareness on the Check Point firewalls.

However they allow users to use company issued or personal laptops. Since the administrator cannot manage the personal laptops, which of the following methods would BEST suit this company?
A . AD Query
B . Browser-Based Authentication
C . Identity Agents
D . Terminal Servers Agent

Answer: B

Explanation:

Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_IdentityAwareness_AdminGuide/62007.htm

Leave a Reply

Your email address will not be published.