Checkpoint 156-536 Practice Test - Questions Answers, Page 6
List of questions
Related questions
What does Port Protection protect, and why?
Activity on the ports of a client computer to help prevent data leakage
Activity on the ports of a client computer to review logs
Activity on the ports of a client computer to help unauthorized user access
Activity on the ports of a client computer to monitor devices
Media Encryption and Port Protection (MEPP) provide strong encryption for removable media, such as?
USB drives, CD/DVDs, and SD cards, and for external ports
Cables and Ethernet cords
External ports only
USB drives and CD/DVDs
Where are the Endpoint policy servers located?
Between the Endpoint clients and the EPS
Between the Endpoint clients and the EMS
Between the Endpoint clients and the NMS
Between the Endpoint clients and the SMS
How is the Kerberos key tab file created?
Using Kerberos principals
Using the AD server
Using encryption keys
With the ktpass tool
External Policy Servers are placed between the Endpoint clients and the Endpoint Security Management Server. How many Policy Servers are supported per environment?
From 1 to 25 Policy Servers are supported
From 1 to 15 Policy Servers are supported
From 1 to 20 Policy Servers are supported
From 1 to 5 Policy Servers are supported
When in the Strong Authentication workflow is the database installed on the secondary server?
After Endpoint security is enabled
Before Endpoint security is enabled
Exactly when Endpoint security is enabled
After synchronization and before Endpoint security has been enabled
What does the Kerberos key tab file contain?
Pairs of authentication settings and un-authentication settings
Pairs of encryption and decryption keys
Pairs of Kerberos principals and encryption keys
Pairs of ktpass tools
External Policy Servers are placed between the Endpoint clients and the Endpoint Security Management Server. What benefit does the External Endpoint Policy Server bring?
Cluster and Delta requests
Heartbeat and synchronization requests
Test packet and delta requests
Polling beat and delta requests
By default, Endpoint Security Manager is configured as which kind of server?
Network Server
Webserver
Management Server
Log Server
The CISO office evaluates Check Point Harmony Endpoint and needs to know what kind of post-infection capabilities exist. Which Post-infection Capabilities does the Harmony Office Suite include?
Question