ExamGecko

Checkpoint 156-536 Practice Test - Questions Answers, Page 5

Question list
Search
Search

What does pre-boot protection require of users?

A.

To authenticate before the computer will start

A.

To authenticate before the computer will start

Answers
B.

To answer a security question after login

B.

To answer a security question after login

Answers
C.

To authenticate before the computer's OS starts

C.

To authenticate before the computer's OS starts

Answers
D.

To regularly change passwords

D.

To regularly change passwords

Answers
Suggested answer: C

One of the Data Security Software Capability protections included in the Harmony Endpoint solution is....

A.

Data Leak Firewall

A.

Data Leak Firewall

Answers
B.

Memory Encryption

B.

Memory Encryption

Answers
C.

Dynamic Data Protection

C.

Dynamic Data Protection

Answers
D.

Remote Access VPN

D.

Remote Access VPN

Answers
Suggested answer: A

An Innovative model that classifies new forms of malware into known malware families based on code and behavioral similarity is called:

A.

Sanitization (CDR)

A.

Sanitization (CDR)

Answers
B.

Polymorphic Model

B.

Polymorphic Model

Answers
C.

Behavior Guard

C.

Behavior Guard

Answers
D.

Anti-Ransomware

D.

Anti-Ransomware

Answers
Suggested answer: C

What capabilities does the Harmony Endpoint NGAV include?

A.

Anti-Ransomware, Anti-Exploit & Behavioral Guard

A.

Anti-Ransomware, Anti-Exploit & Behavioral Guard

Answers
B.

Anti-IPS, Anti-Firewall & Anti-Guard

B.

Anti-IPS, Anti-Firewall & Anti-Guard

Answers
C.

Zero-Phishing, Anti-Bot& Anti-Virus

C.

Zero-Phishing, Anti-Bot& Anti-Virus

Answers
D.

Threat Extraction, Threat-Emulation & Zero-Phishing

D.

Threat Extraction, Threat-Emulation & Zero-Phishing

Answers
Suggested answer: A

Which Endpoint capability ensures that protected computers comply with your organization's requirements and allows you to assign different security levels according to the compliance state of the endpoint computer?

A.

Compliance Check

A.

Compliance Check

Answers
B.

Capsule Cloud Compliance

B.

Capsule Cloud Compliance

Answers
C.

Forensics and Anti-Ransomware

C.

Forensics and Anti-Ransomware

Answers
D.

Full Disk Encryption

D.

Full Disk Encryption

Answers
Suggested answer: A

Which User Roles are on the Endpoint Security Management Server for On-Premises servers?

A.

Primary Administrator and Read-Only

A.

Primary Administrator and Read-Only

Answers
B.

Super Admin, Primary Administrator, User Admin, Read-Only

B.

Super Admin, Primary Administrator, User Admin, Read-Only

Answers
C.

Admin and Read-Only

C.

Admin and Read-Only

Answers
D.

Super Admin, Read-Write All, Read-Only

D.

Super Admin, Read-Write All, Read-Only

Answers
Suggested answer: B

External Endpoint policy servers (EPS) decrease X and reduce X between sites?

A.

Decrease policies and reduce traffic between sites

A.

Decrease policies and reduce traffic between sites

Answers
B.

Decrease power and reduce accidents between sites

B.

Decrease power and reduce accidents between sites

Answers
C.

Decrease clients and reduce device agents between sites

C.

Decrease clients and reduce device agents between sites

Answers
D.

External Endpoint policy servers (EPS) decrease the load of the EMS and reduce the bandwidth required between sites

D.

External Endpoint policy servers (EPS) decrease the load of the EMS and reduce the bandwidth required between sites

Answers
Suggested answer: D

What does Unauthenticated mode mean?

A.

Computers and users might present a security risk, but still have access.

A.

Computers and users might present a security risk, but still have access.

Answers
B.

Computers and users are trusted based on their IP address and username.

B.

Computers and users are trusted based on their IP address and username.

Answers
C.

Computers and users have credentials, but they are not verified through AD.

C.

Computers and users have credentials, but they are not verified through AD.

Answers
D.

Computers and users are trusted based on the passwords and usernames only.

D.

Computers and users are trusted based on the passwords and usernames only.

Answers
Suggested answer: A

If there are multiple EPS in an environment, what happens?

A.

One Endpoint client automatically communicates with the server

A.

One Endpoint client automatically communicates with the server

Answers
B.

Each Endpoint client automatically communicates with the EMS

B.

Each Endpoint client automatically communicates with the EMS

Answers
C.

Each Endpoint client does an analysis to find which EPS is 'closest' and automatically communicates with that server.

C.

Each Endpoint client does an analysis to find which EPS is 'closest' and automatically communicates with that server.

Answers
D.

Each Endpoint client automatically communicates with the SMS

D.

Each Endpoint client automatically communicates with the SMS

Answers
Suggested answer: C

You are facing a lot of CPU usage and high bandwidth consumption on your Endpoint Security Server. You check and verify that everything is working as it should be, but the performance is still very slow. What can you do to decrease your bandwidth and CPU usage?

A.

The managements High Availability sizing is not correct. You have to purchase more servers and add them to the cluster.

A.

The managements High Availability sizing is not correct. You have to purchase more servers and add them to the cluster.

Answers
B.

Your company's size is not large enough to have a valid need for Endpoint Solution.

B.

Your company's size is not large enough to have a valid need for Endpoint Solution.

Answers
C.

Your company needs more bandwidth. You have to increase your bandwidth by 300%

C.

Your company needs more bandwidth. You have to increase your bandwidth by 300%

Answers
D.

You can use some of your Endpoints as Super Nodes since super nodes reduces bandwidth as well as CPU usage.

D.

You can use some of your Endpoints as Super Nodes since super nodes reduces bandwidth as well as CPU usage.

Answers
Suggested answer: D
Total 75 questions
Go to page: of 8