exam questions

Exam 156-536 All Questions

View all questions & answers for the 156-536 exam

Exam 156-536 topic 1 question 58 discussion

Actual exam question from Checkpoint's 156-536
Question #: 58
Topic #: 1
[All 156-536 Questions]

What does Unauthenticated mode mean?

  • A. Computers and users might present a security risk, but still have access.
  • B. Computers and users are trusted based on their IP address and username.
  • C. Computers and users have credentials, but they are not verified through AD.
  • D. Computers and users are trusted based on the passwords and usernames only.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
tombeat
1 month, 1 week ago
Selected Answer: B
In Unauthenticated mode, access is allowed to users or hosts without requiring them to authenticate through AD, Captive Portal, or Identity Awareness mechanisms. Instead, identity information (like IP address and username) is obtained from external sources (for example, Identity Collector, AD Query, or Session Directory), and the connection is allowed based on that identity mapping. It’s considered “unauthenticated” because no explicit user authentication (such as password or token) occurs! "identified" is not equal to "verified"
upvoted 1 times
...
909da8d
2 months, 1 week ago
Selected Answer: B
Unauthenticated mode - Client computers and the users on those computers are not authenticated when they connect to the Endpoint Security Management ServerClosedDedicated Check Point server that runs Check Point software to manage the objects and policies in a Check Point environment within a single management Domain. Synonym: Single-Domain Security Management Server.. They are trusted "by name". This operation mode is recommended for evaluation purposes only. https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Harmony-Endpoint-Admin-Guide/Topics-HEP/Active-Directory-Authentication.htm
upvoted 1 times
...
Nicknamefordiscussions_1
5 months, 2 weeks ago
Selected Answer: C
I think answer C is a better fit. Unauthenticated mode is part of the Active directory Authentication in the endpoint solution. Endpoint Security Active Directory Authentication When an Endpoint Security client connects to the Endpoint Security Management, an authentication process identifies the endpoint client and the user currently working on that computer. The Endpoint Security system can function in these authentication modes: Unauthenticated mode - Client computers and the users on those computers are not authenticated when they connect to the Endpoint Security Management. They are trusted "by name". This operation mode is recommended for evaluation purposes only. Strong Authentication mode - Client computers and the users on those computers are authenticated with the Endpoint Security Management when they connect to the Endpoint Security Management Server. The authentication is done by the Active Directory server using the industry-standard Kerberos protocol. This option is only available for endpoints that are part of Active Directory.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...