ExamGecko

Checkpoint 156-536 Practice Test - Questions Answers, Page 6

Question list
Search
Search

What does Port Protection protect, and why?

A.

Activity on the ports of a client computer to help prevent data leakage

A.

Activity on the ports of a client computer to help prevent data leakage

Answers
B.

Activity on the ports of a client computer to review logs

B.

Activity on the ports of a client computer to review logs

Answers
C.

Activity on the ports of a client computer to help unauthorized user access

C.

Activity on the ports of a client computer to help unauthorized user access

Answers
D.

Activity on the ports of a client computer to monitor devices

D.

Activity on the ports of a client computer to monitor devices

Answers
Suggested answer: A

Media Encryption and Port Protection (MEPP) provide strong encryption for removable media, such as?

A.

USB drives, CD/DVDs, and SD cards, and for external ports

A.

USB drives, CD/DVDs, and SD cards, and for external ports

Answers
B.

Cables and Ethernet cords

B.

Cables and Ethernet cords

Answers
C.

External ports only

C.

External ports only

Answers
D.

USB drives and CD/DVDs

D.

USB drives and CD/DVDs

Answers
Suggested answer: A

Where are the Endpoint policy servers located?

A.

Between the Endpoint clients and the EPS

A.

Between the Endpoint clients and the EPS

Answers
B.

Between the Endpoint clients and the EMS

B.

Between the Endpoint clients and the EMS

Answers
C.

Between the Endpoint clients and the NMS

C.

Between the Endpoint clients and the NMS

Answers
D.

Between the Endpoint clients and the SMS

D.

Between the Endpoint clients and the SMS

Answers
Suggested answer: B

How is the Kerberos key tab file created?

A.

Using Kerberos principals

A.

Using Kerberos principals

Answers
B.

Using the AD server

B.

Using the AD server

Answers
C.

Using encryption keys

C.

Using encryption keys

Answers
D.

With the ktpass tool

D.

With the ktpass tool

Answers
Suggested answer: D

External Policy Servers are placed between the Endpoint clients and the Endpoint Security Management Server. How many Policy Servers are supported per environment?

A.

From 1 to 25 Policy Servers are supported

A.

From 1 to 25 Policy Servers are supported

Answers
B.

From 1 to 15 Policy Servers are supported

B.

From 1 to 15 Policy Servers are supported

Answers
C.

From 1 to 20 Policy Servers are supported

C.

From 1 to 20 Policy Servers are supported

Answers
D.

From 1 to 5 Policy Servers are supported

D.

From 1 to 5 Policy Servers are supported

Answers
Suggested answer: A

When in the Strong Authentication workflow is the database installed on the secondary server?

A.

After Endpoint security is enabled

A.

After Endpoint security is enabled

Answers
B.

Before Endpoint security is enabled

B.

Before Endpoint security is enabled

Answers
C.

Exactly when Endpoint security is enabled

C.

Exactly when Endpoint security is enabled

Answers
D.

After synchronization and before Endpoint security has been enabled

D.

After synchronization and before Endpoint security has been enabled

Answers
Suggested answer: D

What does the Kerberos key tab file contain?

A.

Pairs of authentication settings and un-authentication settings

A.

Pairs of authentication settings and un-authentication settings

Answers
B.

Pairs of encryption and decryption keys

B.

Pairs of encryption and decryption keys

Answers
C.

Pairs of Kerberos principals and encryption keys

C.

Pairs of Kerberos principals and encryption keys

Answers
D.

Pairs of ktpass tools

D.

Pairs of ktpass tools

Answers
Suggested answer: C

External Policy Servers are placed between the Endpoint clients and the Endpoint Security Management Server. What benefit does the External Endpoint Policy Server bring?

A.

Cluster and Delta requests

A.

Cluster and Delta requests

Answers
B.

Heartbeat and synchronization requests

B.

Heartbeat and synchronization requests

Answers
C.

Test packet and delta requests

C.

Test packet and delta requests

Answers
D.

Polling beat and delta requests

D.

Polling beat and delta requests

Answers
Suggested answer: B

By default, Endpoint Security Manager is configured as which kind of server?

A.

Network Server

A.

Network Server

Answers
B.

Webserver

B.

Webserver

Answers
C.

Management Server

C.

Management Server

Answers
D.

Log Server

D.

Log Server

Answers
Suggested answer: C

The CISO office evaluates Check Point Harmony Endpoint and needs to know what kind of post-infection capabilities exist. Which Post-infection Capabilities does the Harmony Office Suite include?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member
Total 75 questions
Go to page: of 8