Exam 156-586 All QuestionsBrowse all questions from this exam
Question 28

What are the three main component of Identity Awareness?

    Correct Answer: C

    Identity Awareness comprises three main components: Identity Source, Identity Server (PDP), and Identity Enforcement (PEP). The Identity Source is responsible for acquiring user identity information, typically through methods like Active Directory integration. The Identity Server, or Policy Decision Point (PDP), processes this identity information and makes access decisions based on predefined policies. Finally, the Identity Enforcement, or Policy Enforcement Point (PEP), enforces these decisions by controlling user access to network resources. This division allows for a more granular and secure management of identities within the network.

Discussion
SakanOption: C

Identity Sources determine how the Identity Awareness Security Gateway learns the user names and computers that generate traffic on the network. The PEP and PDP processes are the other key components of the system. Through them, administrators control user access and network protection.

z8d21oczdOption: C

I think C is correct When configured, policy decision and enforcement is handled by the Identity Awareness Policy Decision Point (PDP) and Policy Enforcement Point (PEP). The basic workflow is: 1. An identity source acquires the identity (for example, username or computer) and associated IP address and sends this information to the PDP, which resides on a Check Point machine. 2. The PDP uses relevant user sources (LDAP / RADIUS / Internal DB) and runs authorization requests and group lookups on the ID to match Access Roles. 3. The PDP sends the identify information to the enforcing Security Gateway's PEP over a SIC connection. The PEP might be on the same Gateway or a different server. 4. The PEP enforces the traffic accordingly; for example, redirecting users to Captive Portal.

ObreroangelOption: A

The question is for Three components, NOT 2. It's A the best option

Anth0nyOption: C

Based on this sk. it should be C https://support.checkpoint.com/results/sk/sk97638

gsvitOption: A

Best Answer "A" Pg. 318 CCTE R80.20 "Identity Awareness uses the source and destination IP addresses of network traffic to identify users and computers. You can use these elements, bundled into an access role object, as matching criteria in the Source and Destination fields of Access Control policy rules"

erickmgaOption: A

The Answer is "A", Kortex page 183 CCTE