ExamGecko

Checkpoint 156-536 Practice Test - Questions Answers

Question list
Search
Search

The Harmony Endpoint solution includes which three Data Security Software Capability protections?

A.

* Full Disk Encryption * Media Encryption * Anti-Malware

A.

* Full Disk Encryption * Media Encryption * Anti-Malware

Answers
B.

* Passwords and Usernames * Port Protection (MEPP) * Security Questions

B.

* Passwords and Usernames * Port Protection (MEPP) * Security Questions

Answers
C.

* Media Encryption * Media Decryption * Remote Access VPN

C.

* Media Encryption * Media Decryption * Remote Access VPN

Answers
D.

* Full Disk Encryption * Media Encryption & Port Protection (MEPP) * Remote Access VPN

D.

* Full Disk Encryption * Media Encryption & Port Protection (MEPP) * Remote Access VPN

Answers
Suggested answer: A

What is the default encryption algorithm in Full Disk Encryption tab under Advanced Settings?

A.

AES-CBC 128 bit

A.

AES-CBC 128 bit

Answers
B.

AES-CBC 256 bit

B.

AES-CBC 256 bit

Answers
C.

XTS-AES 256 bit

C.

XTS-AES 256 bit

Answers
D.

XTS-AES 128 bit

D.

XTS-AES 128 bit

Answers
Suggested answer: C

How does FDE add another layer of security?

A.

By offering media encryption

A.

By offering media encryption

Answers
B.

By offering pre-boot protection

B.

By offering pre-boot protection

Answers
C.

By offering port protection

C.

By offering port protection

Answers
D.

By offering encryption

D.

By offering encryption

Answers
Suggested answer: B

What communication protocol does Harmony Endpoint management use to communicate with the management server?

A.

SIC

A.

SIC

Answers
B.

CPCOM

B.

CPCOM

Answers
C.

TCP

C.

TCP

Answers
D.

UDP

D.

UDP

Answers
Suggested answer: B

What does the Data protection/General rule contain?

A.

Actions that define user authentication settings only

A.

Actions that define user authentication settings only

Answers
B.

Actions that define decryption settings for hard disks

B.

Actions that define decryption settings for hard disks

Answers
C.

Actions that restore encryption settings for hard disks and change user authentication settings

C.

Actions that restore encryption settings for hard disks and change user authentication settings

Answers
D.

Actions that define port protection settings and encryption settings for hard disks and removable media

D.

Actions that define port protection settings and encryption settings for hard disks and removable media

Answers
Suggested answer: D

The Remote Help tool can be used to assist users in password recovery. What type of assistance does this tool provide?

A.

The Remote Help only provides procedural information and FAQs about the Endpoint Security Client including procedure to reset password

A.

The Remote Help only provides procedural information and FAQs about the Endpoint Security Client including procedure to reset password

Answers
B.

The Remote Help tool provides a) User Logon Pre-boot Remote Help b) Media Encryption Remote Help

B.

The Remote Help tool provides a) User Logon Pre-boot Remote Help b) Media Encryption Remote Help

Answers
C.

The Remote Help tool provides a) Link to the secret location of encrypted password file b) Key to decrypt the password file

C.

The Remote Help tool provides a) Link to the secret location of encrypted password file b) Key to decrypt the password file

Answers
D.

The Remote Help tool unlocks admin accounts on SmartEndpoint

D.

The Remote Help tool unlocks admin accounts on SmartEndpoint

Answers
Suggested answer: A

When does the pre-boot logon require users to authenticate?

A.

Before password verification

A.

Before password verification

Answers
B.

Before the computer's main operating system starts

B.

Before the computer's main operating system starts

Answers
C.

Before they enter their username

C.

Before they enter their username

Answers
D.

Before the credentials are verified

D.

Before the credentials are verified

Answers
Suggested answer: B

Which of the following is not protected by the Full Disk Encryption (FDE) software:

1) Client's user data

2) Operating system files

3) Temporary files

4) Erased files

A.

Temporary and erased files

A.

Temporary and erased files

Answers
B.

All of these are protected with FDE

B.

All of these are protected with FDE

Answers
C.

Erased files

C.

Erased files

Answers
D.

Temporary files

D.

Temporary files

Answers
Suggested answer: A

'Heartbeat' refers to what?

A.

A periodic client connection to the server

A.

A periodic client connection to the server

Answers
B.

A client connection that happens every 60 seconds

B.

A client connection that happens every 60 seconds

Answers
C.

A server connection that happens every 5 minutes

C.

A server connection that happens every 5 minutes

Answers
D.

A random server connection

D.

A random server connection

Answers
Suggested answer: A

What are the benefits of the Check Point Consolidated Cyber Security Architecture?

A.

Consolidated network functions

A.

Consolidated network functions

Answers
B.

Single policy

B.

Single policy

Answers
C.

decentralized management

C.

decentralized management

Answers
D.

Consolidated security functions

D.

Consolidated security functions

Answers
Suggested answer: D
Total 75 questions
Go to page: of 8