Which Identity Source(s) should be selected in Identity Awareness for when there is a requirement for a higher level of security for sensitive servers?
A . AD Query
B . Terminal Servers Endpoint Identity Agent
C . Endpoint Identity Agent and Browser-Based Authentication
D . RADIUS and Account Logon
Answer: C
Explanation:
Endpoint Identity Agents and Browser-Based Authentication – When a high level of security is necessary. The Captive Portal is used for distributing the Endpoint Identity Agent. IP Spoofing protection can be set to prevent packets from being IP spoofed.
Reference: https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_IdentityAwareness_AdminGuide/html_frameset.htm?topic=documents/R80.10/WebAdminGuides/EN/CP_R80.10_IdentityAwareness_AdminGuide/101858