Free 156-915.80 Exam Braindumps (page: 35)

Page 34 of 76

Complete this statement from the options provided. Using Captive Portal, unidentified users may be either; blocked, allowed to enter required credentials, or required to download the _____________.

  1. Identity Awareness Agent
  2. Full Endpoint Client
  3. ICA Certificate
  4. SecureClient

Answer(s): A



Assume you are a Security Administrator for ABCTech. You have allowed authenticated access to users from Mkting_net to Finance_net. But in the user's properties, connections are only permitted within Mkting_net.
What is the BEST way to resolve this conflict?

  1. Select Ignore Database in the Action Properties window.
  2. Permit access to Finance_net.
  3. Select Intersect with user database in the Action Properties window.
  4. Select Intersect with user database or Ignore Database in the Action Properties window.

Answer(s): D



Charles requests a Website while using a computer not in the net_singapore network.
What is TRUE about his location restriction?

  1. Source setting in Source column always takes precedence.
  2. Source setting in User Properties always takes precedence.
  3. As location restrictions add up, he would be allowed from net_singapore and net_sydney.
  4. It depends on how the User Auth object is configured; whether User Properties or Source Restriction takes precedence.

Answer(s): D



You need to back up the routing, interface, and DNS configuration information from your R80 GAiA Security Gateway. Which backup-and-restore solution do you use?

  1. Manual copies of the directory $FWDIR/conf
  2. GAiA back up utilities
  3. upgrade_export and upgrade_import commands
  4. Database Revision Control

Answer(s): B






Post your Comments and Discuss Checkpoint 156-915.80 exam with other Community members:

156-915.80 Exam Discussions & Posts