ExamGecko

Checkpoint 156-536 Practice Test - Questions Answers, Page 3

Question list
Search
Search

What are the General components of Data Protection?

A.

Data protection includes VPN. and Firewall capabilities.

A.

Data protection includes VPN. and Firewall capabilities.

Answers
B.

Full Disk Encryption (FDE). Media Encryption and Port Protection.

B.

Full Disk Encryption (FDE). Media Encryption and Port Protection.

Answers
C.

it supports SmartCard Authentication and Pre-Boot encryption.

C.

it supports SmartCard Authentication and Pre-Boot encryption.

Answers
D.

Only OneCheck in Pre-Boot environment.

D.

Only OneCheck in Pre-Boot environment.

Answers
Suggested answer: B

Where are quarantined files stored?

A.

On client computer, under C:\ProgramData\CheckPoint\Endpoint Security\Remediation\quarantlne

A.

On client computer, under C:\ProgramData\CheckPoint\Endpoint Security\Remediation\quarantlne

Answers
B.

On client computer, under C:\ProgramData\CheckPoint\Harmony Endpoint Security\quarantine

B.

On client computer, under C:\ProgramData\CheckPoint\Harmony Endpoint Security\quarantine

Answers
C.

On Management server, under $FWDIR\sba\Remediation\quarantine

C.

On Management server, under $FWDIR\sba\Remediation\quarantine

Answers
D.

On client computer, under C:\Program Files\CheckPoint\Endpoint Security\Remedlaiion\quarantine

D.

On client computer, under C:\Program Files\CheckPoint\Endpoint Security\Remedlaiion\quarantine

Answers
Suggested answer: B

What connect options does the connection Awareness support?

A.

There are two options: Connected and Disconnected

A.

There are two options: Connected and Disconnected

Answers
B.

Master and Slave Endpoint Security Management Server.

B.

Master and Slave Endpoint Security Management Server.

Answers
C.

Client and Server model based on Idap model. The supported ports are 389 and 636.

C.

Client and Server model based on Idap model. The supported ports are 389 and 636.

Answers
D.

There are two options: Connected to Management and Connected to a List of Specified Targets.

D.

There are two options: Connected to Management and Connected to a List of Specified Targets.

Answers
Suggested answer: D

Which information can we find on the Operational Overview dashboard?

A.

Active Attacks. Deployment status. Pre-boot status, Anti-Malware update. Harmony Endpoint Version and Operating system

A.

Active Attacks. Deployment status. Pre-boot status, Anti-Malware update. Harmony Endpoint Version and Operating system

Answers
B.

Active Endpoints. Active Alerts, Deployment status, Pre-boot status, Encryption Status

B.

Active Endpoints. Active Alerts, Deployment status, Pre-boot status, Encryption Status

Answers
C.

Hosts under Attack, Active Attacks, Blocked Attacks

C.

Hosts under Attack, Active Attacks, Blocked Attacks

Answers
D.

Desktops. Servers, Active Alerts, Anti-Malware update, Harmony Endpoint Version

D.

Desktops. Servers, Active Alerts, Anti-Malware update, Harmony Endpoint Version

Answers
Suggested answer: B

Which command in CLI session is used to check installed licenses on Harmony Endpoint Management server?

A.

cplic print-x

A.

cplic print-x

Answers
B.

show licenses all

B.

show licenses all

Answers
C.

cplic add <license filename>

C.

cplic add <license filename>

Answers
D.

cplic print +x

D.

cplic print +x

Answers
Suggested answer: A

What blades have to be enabled on the Management Server in order for the Endpoint Security Management Server to operate?

A.

You can enable all gateway related blades.

A.

You can enable all gateway related blades.

Answers
B.

The administrator has to enable compliance and Network Policy Management.

B.

The administrator has to enable compliance and Network Policy Management.

Answers
C.

Logging & Status, SmartEvent Server, and SmartEvent Correlation unit must be enabled.

C.

Logging & Status, SmartEvent Server, and SmartEvent Correlation unit must be enabled.

Answers
D.

The SmartEndPoint super Node on the Management.

D.

The SmartEndPoint super Node on the Management.

Answers
Suggested answer: C

When you are facing a technical problem and you need help, what resource is recommended for all technical information about Check Point products?

A.

You can use an online search engine like Google and you will find the answer in the first results.

A.

You can use an online search engine like Google and you will find the answer in the first results.

Answers
B.

Check Point SecureKnowledge, CheckMates and Check Point Customer Support.

B.

Check Point SecureKnowledge, CheckMates and Check Point Customer Support.

Answers
C.

You ca use any infosec related online sources.

C.

You ca use any infosec related online sources.

Answers
D.

Press F1 in the SmartConsole and write down the problem.

D.

Press F1 in the SmartConsole and write down the problem.

Answers
Suggested answer: B

In the OVERVIEW Tab of the Harmony Endpoint portal which Overview shows the Active Alerts?

A.

The Policy Overview

A.

The Policy Overview

Answers
B.

The Computer Management view

B.

The Computer Management view

Answers
C.

The Operational Overview

C.

The Operational Overview

Answers
D.

The Security Overview

D.

The Security Overview

Answers
Suggested answer: C

Which option allows the Endpoint Security Management Server to modify client settings such as shutting down or restarting the client computers without installing policy?

A.

Remote Operations

A.

Remote Operations

Answers
B.

Node Management

B.

Node Management

Answers
C.

Remote Help

C.

Remote Help

Answers
D.

Push Operations

D.

Push Operations

Answers
Suggested answer: D

What information does the Endpoint Client provide end users?

A.

Overview summary of all machines and their status.

A.

Overview summary of all machines and their status.

Answers
B.

Overview summary of the protections deployed on the machines and the status of each protection.

B.

Overview summary of the protections deployed on the machines and the status of each protection.

Answers
C.

Overview summary of security breaches.

C.

Overview summary of security breaches.

Answers
D.

Overview summary of traffic logs.

D.

Overview summary of traffic logs.

Answers
Suggested answer: B
Total 75 questions
Go to page: of 8