How does he solve this problem?

John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HR
servers to designated IP addresses to minimize malware infection and unauthorized access risks.
Thus, the gateway policy permits access only from John’s desktop which is assigned a static IP
address 10.0.0.19.
John received a laptop and wants to access the HR Web Server from anywhere in the
organization. The IT department gave the laptop a static IP address, but that limits him to
operating it only from his desk. The current Rule Base contains a rule that lets John Adams
access the HR Web Server from his laptop with a static IP (10.0.0.19). He wants to move around
the organization and continue to have access to the HR Web Server.
To make this scenario work, the IT administrator:

1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sources
installs the policy.
2) Adds an access role object to the Firewall Rule Base that lets John Adams PC access the HR
Web Server from any machine and from any location.
John plugged in his laptop to the network on a different network segment and he is not able to
connect.
How does he solve this problem?

John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HR
servers to designated IP addresses to minimize malware infection and unauthorized access risks.
Thus, the gateway policy permits access only from John’s desktop which is assigned a static IP
address 10.0.0.19.
John received a laptop and wants to access the HR Web Server from anywhere in the
organization. The IT department gave the laptop a static IP address, but that limits him to
operating it only from his desk. The current Rule Base contains a rule that lets John Adams
access the HR Web Server from his laptop with a static IP (10.0.0.19). He wants to move around
the organization and continue to have access to the HR Web Server.
To make this scenario work, the IT administrator:

1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sources
installs the policy.
2) Adds an access role object to the Firewall Rule Base that lets John Adams PC access the HR
Web Server from any machine and from any location.
John plugged in his laptop to the network on a different network segment and he is not able to
connect.
How does he solve this problem?

A.
John should lock and unlock the computer

B.
Investigate this as a network connectivity issue

C.
John should install the Identity Awareness Agent

D.
The firewall admin should install the Security Policy

Explanation:



Leave a Reply 3

Your email address will not be published. Required fields are marked *


Marcos

Marcos

answer “C” ?

khaiti

khaiti

B is right.

AdamĀ“s PC could change the GEO location but not the network segment, because of static IP address assignment.

Raul

Raul

A is the right answer