Correct Answer: A
Explanation
The Access Control policy supports two policy layers. These are the Network layer and the Application & URL Filtering layer. The Network layer contains rules that control the network traffic based on the source, destination, service, and action. The Application & URL Filtering layer contains rules that control the application and web access based on the application, site category, and user identity12.
The Access Control policy can also use inline layers, which are sub-policies that are embedded within a rule. Inline layers allow more granular control over specific traffic or scenarios, such as VPN, Mobile Access, or different user groups13. However, inline layers are not considered as separate policy layers, but rather as extensions of the parent rule4.
Therefore, the correct answer is A. The Access Control policy supports two policy layers.
References:
1, Policy Layers in R80.x - Check Point CheckMates
2, Access Control policies, layers, and rules | Check Point Firewall ...
3, Chapter 8: Introduction to Policies, Layers, and Rules - Check Point ...
4, Creating an Access Control Policy - Check Point Software