ExamGecko
Home / Checkpoint / 156-536 / List of questions
Ask Question

Checkpoint 156-536 Practice Test - Questions Answers, Page 3

List of questions

Question 21

Report Export Collapse

What are the General components of Data Protection?

Data protection includes VPN. and Firewall capabilities.

Data protection includes VPN. and Firewall capabilities.

Full Disk Encryption (FDE). Media Encryption and Port Protection.

Full Disk Encryption (FDE). Media Encryption and Port Protection.

it supports SmartCard Authentication and Pre-Boot encryption.

it supports SmartCard Authentication and Pre-Boot encryption.

Only OneCheck in Pre-Boot environment.

Only OneCheck in Pre-Boot environment.

Suggested answer: B
asked 02/12/2024
Ishan Rathnayaka
42 questions

Question 22

Report Export Collapse

Where are quarantined files stored?

On client computer, under C:\ProgramData\CheckPoint\Endpoint Security\Remediation\quarantlne

On client computer, under C:\ProgramData\CheckPoint\Endpoint Security\Remediation\quarantlne

On client computer, under C:\ProgramData\CheckPoint\Harmony Endpoint Security\quarantine

On client computer, under C:\ProgramData\CheckPoint\Harmony Endpoint Security\quarantine

On Management server, under $FWDIR\sba\Remediation\quarantine

On Management server, under $FWDIR\sba\Remediation\quarantine

On client computer, under C:\Program Files\CheckPoint\Endpoint Security\Remedlaiion\quarantine

On client computer, under C:\Program Files\CheckPoint\Endpoint Security\Remedlaiion\quarantine

Suggested answer: B
asked 02/12/2024
GISELE AGNARAMON
53 questions

Question 23

Report Export Collapse

What connect options does the connection Awareness support?

There are two options: Connected and Disconnected

There are two options: Connected and Disconnected

Master and Slave Endpoint Security Management Server.

Master and Slave Endpoint Security Management Server.

Client and Server model based on Idap model. The supported ports are 389 and 636.

Client and Server model based on Idap model. The supported ports are 389 and 636.

There are two options: Connected to Management and Connected to a List of Specified Targets.

There are two options: Connected to Management and Connected to a List of Specified Targets.

Suggested answer: D
asked 02/12/2024
Oleksandr Kondratchuk
37 questions

Question 24

Report Export Collapse

Which information can we find on the Operational Overview dashboard?

Active Attacks. Deployment status. Pre-boot status, Anti-Malware update. Harmony Endpoint Version and Operating system

Active Attacks. Deployment status. Pre-boot status, Anti-Malware update. Harmony Endpoint Version and Operating system

Active Endpoints. Active Alerts, Deployment status, Pre-boot status, Encryption Status

Active Endpoints. Active Alerts, Deployment status, Pre-boot status, Encryption Status

Hosts under Attack, Active Attacks, Blocked Attacks

Hosts under Attack, Active Attacks, Blocked Attacks

Desktops. Servers, Active Alerts, Anti-Malware update, Harmony Endpoint Version

Desktops. Servers, Active Alerts, Anti-Malware update, Harmony Endpoint Version

Suggested answer: B
asked 02/12/2024
Nidal Allamadani
53 questions

Question 25

Report Export Collapse

Which command in CLI session is used to check installed licenses on Harmony Endpoint Management server?

cplic print-x

cplic print-x

show licenses all

show licenses all

cplic add <license filename>

cplic add <license filename>

cplic print +x

cplic print +x

Suggested answer: A
asked 02/12/2024
Fernando Pereira dos Santos
44 questions

Question 26

Report Export Collapse

What blades have to be enabled on the Management Server in order for the Endpoint Security Management Server to operate?

You can enable all gateway related blades.

You can enable all gateway related blades.

The administrator has to enable compliance and Network Policy Management.

The administrator has to enable compliance and Network Policy Management.

Logging & Status, SmartEvent Server, and SmartEvent Correlation unit must be enabled.

Logging & Status, SmartEvent Server, and SmartEvent Correlation unit must be enabled.

The SmartEndPoint super Node on the Management.

The SmartEndPoint super Node on the Management.

Suggested answer: C
asked 02/12/2024
Pranoy Bej
37 questions

Question 27

Report Export Collapse

When you are facing a technical problem and you need help, what resource is recommended for all technical information about Check Point products?

You can use an online search engine like Google and you will find the answer in the first results.

You can use an online search engine like Google and you will find the answer in the first results.

Check Point SecureKnowledge, CheckMates and Check Point Customer Support.

Check Point SecureKnowledge, CheckMates and Check Point Customer Support.

You ca use any infosec related online sources.

You ca use any infosec related online sources.

Press F1 in the SmartConsole and write down the problem.

Press F1 in the SmartConsole and write down the problem.

Suggested answer: B
asked 02/12/2024
Marcin Cieślak
49 questions

Question 28

Report Export Collapse

In the OVERVIEW Tab of the Harmony Endpoint portal which Overview shows the Active Alerts?

The Policy Overview

The Policy Overview

The Computer Management view

The Computer Management view

The Operational Overview

The Operational Overview

The Security Overview

The Security Overview

Suggested answer: C
asked 02/12/2024
Son Pham Hong
54 questions

Question 29

Report Export Collapse

Which option allows the Endpoint Security Management Server to modify client settings such as shutting down or restarting the client computers without installing policy?

Remote Operations

Remote Operations

Node Management

Node Management

Remote Help

Remote Help

Push Operations

Push Operations

Suggested answer: D
asked 02/12/2024
Michel van Klaveren
41 questions

Question 30

Report Export Collapse

What information does the Endpoint Client provide end users?

Overview summary of all machines and their status.

Overview summary of all machines and their status.

Overview summary of the protections deployed on the machines and the status of each protection.

Overview summary of the protections deployed on the machines and the status of each protection.

Overview summary of security breaches.

Overview summary of security breaches.

Overview summary of traffic logs.

Overview summary of traffic logs.

Suggested answer: B
asked 02/12/2024
vladimir nezgoda
43 questions
Total 75 questions
Go to page: of 8