ExamGecko

Checkpoint 156-536 Practice Test - Questions Answers, Page 4

Question list
Search
Search

Name one way to install Endpoint Security clients:

A.

Third-party deployment tools

A.

Third-party deployment tools

Answers
B.

Automatic using the server deployment rules

B.

Automatic using the server deployment rules

Answers
C.

Package import

C.

Package import

Answers
D.

Manual deployment using the internet

D.

Manual deployment using the internet

Answers
Suggested answer: B

How many Endpoint Security Client Package types exist?

A.

There are two main package types. Initial Client Package and Endpoint Security Client Packages.

A.

There are two main package types. Initial Client Package and Endpoint Security Client Packages.

Answers
B.

There are two packages. One for Windows and one for MacOS

B.

There are two packages. One for Windows and one for MacOS

Answers
C.

The administrator has to download all the appropriate packages from the UserCenter.

C.

The administrator has to download all the appropriate packages from the UserCenter.

Answers
D.

There is only the initial package.

D.

There is only the initial package.

Answers
Suggested answer: A

How can an administrator tell when the MAC OS Harmony Endpoint client is successfully installed?

A.

The Apple device will automatically reboot when the installation is complete. This is confirmation that the client is installed.

A.

The Apple device will automatically reboot when the installation is complete. This is confirmation that the client is installed.

Answers
B.

The MAC OS will generate a pop-up message to notify the administrator.

B.

The MAC OS will generate a pop-up message to notify the administrator.

Answers
C.

When the client is successfully installed, the Endpoint icon will app ear in the computer's menu bar.

C.

When the client is successfully installed, the Endpoint icon will app ear in the computer's menu bar.

Answers
D.

The Harmony management portal will generate a pop-up in the portal to notify the administrator.

D.

The Harmony management portal will generate a pop-up in the portal to notify the administrator.

Answers
Suggested answer: C

Harmony Endpoint offers Endpoint Security Client packages for which operating systems?

A.

Unix, WinLinux and macOS

A.

Unix, WinLinux and macOS

Answers
B.

Windows, macOS and Linux operating systems

B.

Windows, macOS and Linux operating systems

Answers
C.

macOS, iPadOS and Windows

C.

macOS, iPadOS and Windows

Answers
D.

Windows, AppleOS and Unix operating systems

D.

Windows, AppleOS and Unix operating systems

Answers
Suggested answer: B

On which desktop operating systems are Harmony Endpoint Clients supported?

A.

Windows, MacOS, Linux and Unix

A.

Windows, MacOS, Linux and Unix

Answers
B.

Only Windows and MacOS

B.

Only Windows and MacOS

Answers
C.

Windows Servers and Clients, MacOS and Linux

C.

Windows Servers and Clients, MacOS and Linux

Answers
D.

Windows Client, MacOS and Linux

D.

Windows Client, MacOS and Linux

Answers
Suggested answer: C

You must make a decision of which FDE algorithm to be used by one of your clients who specializes in multimedia video editing. What algorithm will you choose?

A.

The implementation of a Secure VPN with very strong encryption will make your data invisible in cases of live internet transmission.

A.

The implementation of a Secure VPN with very strong encryption will make your data invisible in cases of live internet transmission.

Answers
B.

In Multimedia applications you do not need to implement any kind of Full disk encryption. You can use software like 7Zip in order to encrypt your data.

B.

In Multimedia applications you do not need to implement any kind of Full disk encryption. You can use software like 7Zip in order to encrypt your data.

Answers
C.

Any kind of data is very important and the Full Disk Encryption technic must be used with the strongest secret key possible. Your client has to use strong encryption like XTS-AES 256 bit.

C.

Any kind of data is very important and the Full Disk Encryption technic must be used with the strongest secret key possible. Your client has to use strong encryption like XTS-AES 256 bit.

Answers
D.

Video processing is a high bandwidth application which utilizes a lot of HDD access time. You have to use a FDE algorithm with small secret key like XTS-AES 128 bit.

D.

Video processing is a high bandwidth application which utilizes a lot of HDD access time. You have to use a FDE algorithm with small secret key like XTS-AES 128 bit.

Answers
Suggested answer: C

What does pre-boot authentication disable?

A.

Workarounds to computer security

A.

Workarounds to computer security

Answers
B.

Identity theft

B.

Identity theft

Answers
C.

Incorrect usernames

C.

Incorrect usernames

Answers
D.

Weak passwords

D.

Weak passwords

Answers
Suggested answer: A

Does the Endpoint Client GUI provide automatic or manual prompting to protect removable storage media usage?

A.

Manual Only

A.

Manual Only

Answers
B.

Either automatic or manual

B.

Either automatic or manual

Answers
C.

Automatic Only

C.

Automatic Only

Answers
D.

Neither automatic or manual

D.

Neither automatic or manual

Answers
Suggested answer: B

Full Disk Encryption (FDE) protects data at rest stored on_________.

A.

RAM Drive

A.

RAM Drive

Answers
B.

SMB Share

B.

SMB Share

Answers
C.

NFS Share

C.

NFS Share

Answers
D.

Hard Drive

D.

Hard Drive

Answers
Suggested answer: D

What does FDE software combine to authorize accessibility to data on desktop computers and laptops?

A.

post-logon authentication and encryption

A.

post-logon authentication and encryption

Answers
B.

OS boot protection with pre-boot authentication and encryption

B.

OS boot protection with pre-boot authentication and encryption

Answers
C.

OS boot protection and post-boot authentication

C.

OS boot protection and post-boot authentication

Answers
D.

Decryption

D.

Decryption

Answers
Suggested answer: B
Total 75 questions
Go to page: of 8