Checkpoint 156-536 Practice Test - Questions Answers, Page 4
List of questions
Related questions
Name one way to install Endpoint Security clients:
Third-party deployment tools
Automatic using the server deployment rules
Package import
Manual deployment using the internet
How many Endpoint Security Client Package types exist?
There are two main package types. Initial Client Package and Endpoint Security Client Packages.
There are two packages. One for Windows and one for MacOS
The administrator has to download all the appropriate packages from the UserCenter.
There is only the initial package.
How can an administrator tell when the MAC OS Harmony Endpoint client is successfully installed?
The Apple device will automatically reboot when the installation is complete. This is confirmation that the client is installed.
The MAC OS will generate a pop-up message to notify the administrator.
When the client is successfully installed, the Endpoint icon will app ear in the computer's menu bar.
The Harmony management portal will generate a pop-up in the portal to notify the administrator.
Harmony Endpoint offers Endpoint Security Client packages for which operating systems?
Unix, WinLinux and macOS
Windows, macOS and Linux operating systems
macOS, iPadOS and Windows
Windows, AppleOS and Unix operating systems
On which desktop operating systems are Harmony Endpoint Clients supported?
Windows, MacOS, Linux and Unix
Only Windows and MacOS
Windows Servers and Clients, MacOS and Linux
Windows Client, MacOS and Linux
You must make a decision of which FDE algorithm to be used by one of your clients who specializes in multimedia video editing. What algorithm will you choose?
The implementation of a Secure VPN with very strong encryption will make your data invisible in cases of live internet transmission.
In Multimedia applications you do not need to implement any kind of Full disk encryption. You can use software like 7Zip in order to encrypt your data.
Any kind of data is very important and the Full Disk Encryption technic must be used with the strongest secret key possible. Your client has to use strong encryption like XTS-AES 256 bit.
Video processing is a high bandwidth application which utilizes a lot of HDD access time. You have to use a FDE algorithm with small secret key like XTS-AES 128 bit.
What does pre-boot authentication disable?
Workarounds to computer security
Identity theft
Incorrect usernames
Weak passwords
Does the Endpoint Client GUI provide automatic or manual prompting to protect removable storage media usage?
Manual Only
Either automatic or manual
Automatic Only
Neither automatic or manual
Full Disk Encryption (FDE) protects data at rest stored on_________.
RAM Drive
SMB Share
NFS Share
Hard Drive
What does FDE software combine to authorize accessibility to data on desktop computers and laptops?
post-logon authentication and encryption
OS boot protection with pre-boot authentication and encryption
OS boot protection and post-boot authentication
Decryption
Question