Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CheckPoint Exam 156-215.81 Topic 4 Question 56 Discussion

Actual exam question for CheckPoint's 156-215.81 exam
Question #: 56
Topic #: 4
[All 156-215.81 Questions]

If an administrator wants to restrict access to a network resource only allowing certain users to access it, and only when they are on a specific network what is the best way to accomplish this?

Show Suggested Answer Hide Answer

Contribute your Thoughts:

kareni
2 months ago
Secure Internal Communication (SIC) plays a key role in controlling access to network resources. How does SIC help in restricting access based on user identity and network location in an Access Control rule?
upvoted 1 times
...
Jody
4 months ago
Haha, Option B is like something my grandpa would suggest. 'Back in my day, we used the 'New Legacy User' feature!'
upvoted 0 times
Gerald
3 months ago
Haha, yeah, Option B does sound a bit old school. We've got more advanced methods now.
upvoted 0 times
...
Lucille
3 months ago
D) Create an Access Role object, with specific users or user groups specified, and specific networks defined Use this access role as the 'Source' of an Access Control rule
upvoted 0 times
...
Billye
3 months ago
C) Create a rule allowing only specific source IP addresses access to the target network resource.
upvoted 0 times
...
Sharita
3 months ago
A) Create an inline layer where the destination is the target network resource Define sub-rules allowing only specific sources to access the target resource
upvoted 0 times
...
...
Rosendo
4 months ago
Hmm, Option C could work, but it feels a bit too restrictive. What if you need to add more IP addresses later? Option D is more flexible.
upvoted 0 times
Frederica
4 months ago
I agree, Option D seems more flexible for adding additional IP addresses later on.
upvoted 0 times
...
Stephaine
4 months ago
Option C could work, but it might be too restrictive.
upvoted 0 times
...
...
Rosann
5 months ago
I agree, Option D is the way to go. Keeps things organized and easy to manage, plus you get the benefit of the Access Role object.
upvoted 0 times
Temeka
4 months ago
Using the Access Role as the source in the Access Control rule really helps in restricting access to only certain users on specific networks.
upvoted 0 times
...
Nichelle
4 months ago
I agree, having specific users and networks defined in the Access Role makes it simple to control access to the network resource.
upvoted 0 times
...
Ciara
5 months ago
Option D is definitely the best choice. It's so much easier to manage access with the Access Role object.
upvoted 0 times
...
...
Makeda
5 months ago
But creating an Access Role object with specific users and networks seems like a secure option as well.
upvoted 0 times
...
Avery
5 months ago
I disagree, I believe using a 'New Legacy User at Location' with LDAP user group is more efficient.
upvoted 0 times
...
Georgiann
5 months ago
Option D seems the most comprehensive approach to me. Defining the specific users/groups and networks in an Access Role object is a nice way to centralize the access controls.
upvoted 0 times
Rodrigo
4 months ago
True, the Access Role object provides more flexibility and centralization for access control.
upvoted 0 times
...
Dean
4 months ago
That could work too, but it might be more limited compared to using an Access Role object.
upvoted 0 times
...
Tonja
4 months ago
But wouldn't creating a rule based on specific source IP addresses also work?
upvoted 0 times
...
Denna
4 months ago
I agree, using an Access Role object seems like a good way to manage access.
upvoted 0 times
...
...
Makeda
5 months ago
I think the best way is to create an inline layer with sub-rules for specific sources.
upvoted 0 times
...

Save Cancel