ExamGecko
Home / Checkpoint / 156-536 / List of questions
Ask Question

Checkpoint 156-536 Practice Test - Questions Answers, Page 4

Add to Whishlist

List of questions

Question 31

Report Export Collapse

Name one way to install Endpoint Security clients:

Third-party deployment tools

Third-party deployment tools

Automatic using the server deployment rules

Automatic using the server deployment rules

Package import

Package import

Manual deployment using the internet

Manual deployment using the internet

Suggested answer: B
asked 02/12/2024
Martine Cornax
41 questions

Question 32

Report Export Collapse

How many Endpoint Security Client Package types exist?

There are two main package types. Initial Client Package and Endpoint Security Client Packages.

There are two main package types. Initial Client Package and Endpoint Security Client Packages.

There are two packages. One for Windows and one for MacOS

There are two packages. One for Windows and one for MacOS

The administrator has to download all the appropriate packages from the UserCenter.

The administrator has to download all the appropriate packages from the UserCenter.

There is only the initial package.

There is only the initial package.

Suggested answer: A
asked 02/12/2024
stefano atzei
37 questions

Question 33

Report Export Collapse

How can an administrator tell when the MAC OS Harmony Endpoint client is successfully installed?

The Apple device will automatically reboot when the installation is complete. This is confirmation that the client is installed.

The Apple device will automatically reboot when the installation is complete. This is confirmation that the client is installed.

The MAC OS will generate a pop-up message to notify the administrator.

The MAC OS will generate a pop-up message to notify the administrator.

When the client is successfully installed, the Endpoint icon will app ear in the computer's menu bar.

When the client is successfully installed, the Endpoint icon will app ear in the computer's menu bar.

The Harmony management portal will generate a pop-up in the portal to notify the administrator.

The Harmony management portal will generate a pop-up in the portal to notify the administrator.

Suggested answer: C
asked 02/12/2024
Mohsin Raza
47 questions

Question 34

Report Export Collapse

Harmony Endpoint offers Endpoint Security Client packages for which operating systems?

Unix, WinLinux and macOS

Unix, WinLinux and macOS

Windows, macOS and Linux operating systems

Windows, macOS and Linux operating systems

macOS, iPadOS and Windows

macOS, iPadOS and Windows

Windows, AppleOS and Unix operating systems

Windows, AppleOS and Unix operating systems

Suggested answer: B
asked 02/12/2024
Olga Trofimova
39 questions

Question 35

Report Export Collapse

On which desktop operating systems are Harmony Endpoint Clients supported?

Windows, MacOS, Linux and Unix

Windows, MacOS, Linux and Unix

Only Windows and MacOS

Only Windows and MacOS

Windows Servers and Clients, MacOS and Linux

Windows Servers and Clients, MacOS and Linux

Windows Client, MacOS and Linux

Windows Client, MacOS and Linux

Suggested answer: C
asked 02/12/2024
Dubravko Jerkovic
38 questions

Question 36

Report Export Collapse

You must make a decision of which FDE algorithm to be used by one of your clients who specializes in multimedia video editing. What algorithm will you choose?

The implementation of a Secure VPN with very strong encryption will make your data invisible in cases of live internet transmission.

The implementation of a Secure VPN with very strong encryption will make your data invisible in cases of live internet transmission.

In Multimedia applications you do not need to implement any kind of Full disk encryption. You can use software like 7Zip in order to encrypt your data.

In Multimedia applications you do not need to implement any kind of Full disk encryption. You can use software like 7Zip in order to encrypt your data.

Any kind of data is very important and the Full Disk Encryption technic must be used with the strongest secret key possible. Your client has to use strong encryption like XTS-AES 256 bit.

Any kind of data is very important and the Full Disk Encryption technic must be used with the strongest secret key possible. Your client has to use strong encryption like XTS-AES 256 bit.

Video processing is a high bandwidth application which utilizes a lot of HDD access time. You have to use a FDE algorithm with small secret key like XTS-AES 128 bit.

Video processing is a high bandwidth application which utilizes a lot of HDD access time. You have to use a FDE algorithm with small secret key like XTS-AES 128 bit.

Suggested answer: C
asked 02/12/2024
THARINDU AMARASINGHE
38 questions

Question 37

Report Export Collapse

What does pre-boot authentication disable?

Workarounds to computer security

Workarounds to computer security

Identity theft

Identity theft

Incorrect usernames

Incorrect usernames

Weak passwords

Weak passwords

Suggested answer: A
asked 02/12/2024
Tim Wersinger
46 questions

Question 38

Report Export Collapse

Does the Endpoint Client GUI provide automatic or manual prompting to protect removable storage media usage?

Manual Only

Manual Only

Either automatic or manual

Either automatic or manual

Automatic Only

Automatic Only

Neither automatic or manual

Neither automatic or manual

Suggested answer: B
asked 02/12/2024
Mohamed Abdul Haq Mohamed Akram
52 questions

Question 39

Report Export Collapse

Full Disk Encryption (FDE) protects data at rest stored on_________.

RAM Drive

RAM Drive

SMB Share

SMB Share

NFS Share

NFS Share

Hard Drive

Hard Drive

Suggested answer: D
asked 02/12/2024
Jonas Weimar
56 questions

Question 40

Report Export Collapse

What does FDE software combine to authorize accessibility to data on desktop computers and laptops?

post-logon authentication and encryption

post-logon authentication and encryption

OS boot protection with pre-boot authentication and encryption

OS boot protection with pre-boot authentication and encryption

OS boot protection and post-boot authentication

OS boot protection and post-boot authentication

Decryption

Decryption

Suggested answer: B
asked 02/12/2024
rayan rayanalbanna
48 questions
Total 75 questions
Go to page: of 8