ExamGecko
Home / Checkpoint / 156-536 / List of questions
Ask Question

Checkpoint 156-536 Practice Test - Questions Answers, Page 5

Add to Whishlist

List of questions

Question 41

Report Export Collapse

What does pre-boot protection require of users?

To authenticate before the computer will start

To authenticate before the computer will start

To answer a security question after login

To answer a security question after login

To authenticate before the computer's OS starts

To authenticate before the computer's OS starts

To regularly change passwords

To regularly change passwords

Suggested answer: C
asked 02/12/2024
Paul Schwarz
45 questions

Question 42

Report Export Collapse

One of the Data Security Software Capability protections included in the Harmony Endpoint solution is....

Data Leak Firewall

Data Leak Firewall

Memory Encryption

Memory Encryption

Dynamic Data Protection

Dynamic Data Protection

Remote Access VPN

Remote Access VPN

Suggested answer: A
asked 02/12/2024
giancarlo bagnetti srl
44 questions

Question 43

Report Export Collapse

An Innovative model that classifies new forms of malware into known malware families based on code and behavioral similarity is called:

Sanitization (CDR)

Sanitization (CDR)

Polymorphic Model

Polymorphic Model

Behavior Guard

Behavior Guard

Anti-Ransomware

Anti-Ransomware

Suggested answer: C
asked 02/12/2024
Justin Bake
49 questions

Question 44

Report Export Collapse

What capabilities does the Harmony Endpoint NGAV include?

Anti-Ransomware, Anti-Exploit & Behavioral Guard

Anti-Ransomware, Anti-Exploit & Behavioral Guard

Anti-IPS, Anti-Firewall & Anti-Guard

Anti-IPS, Anti-Firewall & Anti-Guard

Zero-Phishing, Anti-Bot& Anti-Virus

Zero-Phishing, Anti-Bot& Anti-Virus

Threat Extraction, Threat-Emulation & Zero-Phishing

Threat Extraction, Threat-Emulation & Zero-Phishing

Suggested answer: A
asked 02/12/2024
Yan Wei
40 questions

Question 45

Report Export Collapse

Which Endpoint capability ensures that protected computers comply with your organization's requirements and allows you to assign different security levels according to the compliance state of the endpoint computer?

Become a Premium Member for full access
  Unlock Premium Member

Question 46

Report Export Collapse

Which User Roles are on the Endpoint Security Management Server for On-Premises servers?

Become a Premium Member for full access
  Unlock Premium Member

Question 47

Report Export Collapse

External Endpoint policy servers (EPS) decrease X and reduce X between sites?

Become a Premium Member for full access
  Unlock Premium Member

Question 48

Report Export Collapse

What does Unauthenticated mode mean?

Become a Premium Member for full access
  Unlock Premium Member

Question 49

Report Export Collapse

If there are multiple EPS in an environment, what happens?

Become a Premium Member for full access
  Unlock Premium Member

Question 50

Report Export Collapse

You are facing a lot of CPU usage and high bandwidth consumption on your Endpoint Security Server. You check and verify that everything is working as it should be, but the performance is still very slow. What can you do to decrease your bandwidth and CPU usage?

Become a Premium Member for full access
  Unlock Premium Member
Total 75 questions
Go to page: of 8