Checkpoint 156-536 Practice Test - Questions Answers, Page 5
List of questions
Related questions
What does pre-boot protection require of users?
To authenticate before the computer will start
To answer a security question after login
To authenticate before the computer's OS starts
To regularly change passwords
One of the Data Security Software Capability protections included in the Harmony Endpoint solution is....
Data Leak Firewall
Memory Encryption
Dynamic Data Protection
Remote Access VPN
An Innovative model that classifies new forms of malware into known malware families based on code and behavioral similarity is called:
Sanitization (CDR)
Polymorphic Model
Behavior Guard
Anti-Ransomware
What capabilities does the Harmony Endpoint NGAV include?
Anti-Ransomware, Anti-Exploit & Behavioral Guard
Anti-IPS, Anti-Firewall & Anti-Guard
Zero-Phishing, Anti-Bot& Anti-Virus
Threat Extraction, Threat-Emulation & Zero-Phishing
Which Endpoint capability ensures that protected computers comply with your organization's requirements and allows you to assign different security levels according to the compliance state of the endpoint computer?
Compliance Check
Capsule Cloud Compliance
Forensics and Anti-Ransomware
Full Disk Encryption
Which User Roles are on the Endpoint Security Management Server for On-Premises servers?
Primary Administrator and Read-Only
Super Admin, Primary Administrator, User Admin, Read-Only
Admin and Read-Only
Super Admin, Read-Write All, Read-Only
External Endpoint policy servers (EPS) decrease X and reduce X between sites?
Decrease policies and reduce traffic between sites
Decrease power and reduce accidents between sites
Decrease clients and reduce device agents between sites
External Endpoint policy servers (EPS) decrease the load of the EMS and reduce the bandwidth required between sites
What does Unauthenticated mode mean?
Computers and users might present a security risk, but still have access.
Computers and users are trusted based on their IP address and username.
Computers and users have credentials, but they are not verified through AD.
Computers and users are trusted based on the passwords and usernames only.
If there are multiple EPS in an environment, what happens?
One Endpoint client automatically communicates with the server
Each Endpoint client automatically communicates with the EMS
Each Endpoint client does an analysis to find which EPS is 'closest' and automatically communicates with that server.
Each Endpoint client automatically communicates with the SMS
You are facing a lot of CPU usage and high bandwidth consumption on your Endpoint Security Server. You check and verify that everything is working as it should be, but the performance is still very slow. What can you do to decrease your bandwidth and CPU usage?
The managements High Availability sizing is not correct. You have to purchase more servers and add them to the cluster.
Your company's size is not large enough to have a valid need for Endpoint Solution.
Your company needs more bandwidth. You have to increase your bandwidth by 300%
You can use some of your Endpoints as Super Nodes since super nodes reduces bandwidth as well as CPU usage.
Question