ExamGecko
Home / Checkpoint / 156-536 / List of questions
Ask Question

Checkpoint 156-536 Practice Test - Questions Answers

Add to Whishlist

List of questions

Question 1

Report Export Collapse

The Harmony Endpoint solution includes which three Data Security Software Capability protections?

* Full Disk Encryption * Media Encryption * Anti-Malware

* Full Disk Encryption * Media Encryption * Anti-Malware

* Passwords and Usernames * Port Protection (MEPP) * Security Questions

* Passwords and Usernames * Port Protection (MEPP) * Security Questions

* Media Encryption * Media Decryption * Remote Access VPN

* Media Encryption * Media Decryption * Remote Access VPN

* Full Disk Encryption * Media Encryption & Port Protection (MEPP) * Remote Access VPN

* Full Disk Encryption * Media Encryption & Port Protection (MEPP) * Remote Access VPN

Suggested answer: A
asked 02/12/2024
Adriano Costa
45 questions

Question 2

Report Export Collapse

What is the default encryption algorithm in Full Disk Encryption tab under Advanced Settings?

AES-CBC 128 bit

AES-CBC 128 bit

AES-CBC 256 bit

AES-CBC 256 bit

XTS-AES 256 bit

XTS-AES 256 bit

XTS-AES 128 bit

XTS-AES 128 bit

Suggested answer: C
asked 02/12/2024
Helmut Steingraber
37 questions

Question 3

Report Export Collapse

How does FDE add another layer of security?

By offering media encryption

By offering media encryption

By offering pre-boot protection

By offering pre-boot protection

By offering port protection

By offering port protection

By offering encryption

By offering encryption

Suggested answer: B
asked 02/12/2024
jim eagleton
38 questions

Question 4

Report Export Collapse

What communication protocol does Harmony Endpoint management use to communicate with the management server?

SIC

SIC

CPCOM

CPCOM

TCP

TCP

UDP

UDP

Suggested answer: B
asked 02/12/2024
Vidana Weerasinghe
49 questions

Question 5

Report Export Collapse

What does the Data protection/General rule contain?

Actions that define user authentication settings only

Actions that define user authentication settings only

Actions that define decryption settings for hard disks

Actions that define decryption settings for hard disks

Actions that restore encryption settings for hard disks and change user authentication settings

Actions that restore encryption settings for hard disks and change user authentication settings

Actions that define port protection settings and encryption settings for hard disks and removable media

Actions that define port protection settings and encryption settings for hard disks and removable media

Suggested answer: D
asked 02/12/2024
Michael Bodine
33 questions

Question 6

Report Export Collapse

The Remote Help tool can be used to assist users in password recovery. What type of assistance does this tool provide?

The Remote Help only provides procedural information and FAQs about the Endpoint Security Client including procedure to reset password

The Remote Help only provides procedural information and FAQs about the Endpoint Security Client including procedure to reset password

The Remote Help tool provides a) User Logon Pre-boot Remote Help b) Media Encryption Remote Help

The Remote Help tool provides a) User Logon Pre-boot Remote Help b) Media Encryption Remote Help

The Remote Help tool provides a) Link to the secret location of encrypted password file b) Key to decrypt the password file

The Remote Help tool provides a) Link to the secret location of encrypted password file b) Key to decrypt the password file

The Remote Help tool unlocks admin accounts on SmartEndpoint

The Remote Help tool unlocks admin accounts on SmartEndpoint

Suggested answer: A
asked 02/12/2024
Ricardo Andres
35 questions

Question 7

Report Export Collapse

When does the pre-boot logon require users to authenticate?

Before password verification

Before password verification

Before the computer's main operating system starts

Before the computer's main operating system starts

Before they enter their username

Before they enter their username

Before the credentials are verified

Before the credentials are verified

Suggested answer: B
asked 02/12/2024
Kurt Van Rymenant
51 questions

Question 8

Report Export Collapse

Which of the following is not protected by the Full Disk Encryption (FDE) software:

1) Client's user data

2) Operating system files

3) Temporary files

4) Erased files

Temporary and erased files

Temporary and erased files

All of these are protected with FDE

All of these are protected with FDE

Erased files

Erased files

Temporary files

Temporary files

Suggested answer: A
asked 02/12/2024
Abiola Unegbu
40 questions

Question 9

Report Export Collapse

'Heartbeat' refers to what?

A periodic client connection to the server

A periodic client connection to the server

A client connection that happens every 60 seconds

A client connection that happens every 60 seconds

A server connection that happens every 5 minutes

A server connection that happens every 5 minutes

A random server connection

A random server connection

Suggested answer: A
asked 02/12/2024
Gajendran Balasingam
45 questions

Question 10

Report Export Collapse

What are the benefits of the Check Point Consolidated Cyber Security Architecture?

Consolidated network functions

Consolidated network functions

Single policy

Single policy

decentralized management

decentralized management

Consolidated security functions

Consolidated security functions

Suggested answer: D
asked 02/12/2024
Adetutu Ogunsowo
48 questions
Total 75 questions
Go to page: of 8