URL Filtering cannot be used to:
URL Filtering cannot be used to:
URL Filtering cannot be used to control bandwidth issues. URL filtering is primarily used to manage access to websites by blocking or allowing access based on categories, users, groups, or machines. It helps improve organizational security, decrease legal liability, and control data security by preventing access to inappropriate or malicious websites. However, managing bandwidth, which involves limiting the amount of traffic or prioritizing certain applications, typically falls under the domain of Quality of Service (QoS) mechanisms, not URL filtering.
Correct answer is D. URL filtering is not a feature that control anything that has to do with bandwidth control/issue, that is the work of QoS.
According to "Check Point Cybersecurity Bootcamp R81.20: CCSA & CCSE" (official book) that I made last week, literally says: URL filtering can be used to: - Control employee Internet access to inappropiate and illicit websites - Control Bandwidth issues - Decrease legal liability - Improve organizational security So, I think is A the right answer
CCSA R81.20 Page 600 A is the correct
A is the correct answer. URL Filtering can be used to: - Control employee Internet access to inappropriate and illicit websites. - Control bandwidth issues. - Decrease legal liability. - Improve organizational security.
Answer is D URL Filtering is a blade that enables administrators to control access to millions of websites by category, users, groups, and machines. URL Filtering can be used to improve organizational security, decrease legal liability, and control data security by preventing users from accessing malicious or inappropriate websites. However, URL Filtering cannot be used to control bandwidth issues, such as limiting the amount of traffic or prioritizing certain applications over others. For that purpose, other blades such as QoS (Quality of Service) or SecureXL are more suitable. Reference: Check Point R81 URL Filtering Administration Guide
I think It's A
It's A
Correct answer is A https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_SecurityManagement_AdminGuide/Content/Topics-SECMG/Creating-Application-Control-and-URL-Filtering-Rules.htm?tocpath=Creating%20an%20Access%20Control%20Policy%7C_____6