Pass the Checkpoint CCES 156-536 Questions and answers with CertsForce

Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions
Questions # 21:

Endpoint’s Media Encryption (ME) Software Capability protects sensitive data on what, and how?

Options:

A.

Storage devices, removable media, and other input/output devices by requiring authorization before a user accesses the device


B.

Input/output devices using Anti-Malware


C.

Removable media and other input/output devices by using encryption methods


D.

Storage devices by requiring multi-factor authorization


Expert Solution
Questions # 22:

What does pre-boot protection prevent?

Options:

A.

Unauthorized access to the Remote Help bypass tools or alternative boot technical support methods


B.

Unauthorized passwords or alternative "forgot passwords" methods during pre-boot


C.

Unauthorized users using post-boot methods


D.

Prevents unauthorized access to the operating system or bypass of boot protection


Expert Solution
Questions # 23:

What does pre-boot protection require of users?

Options:

A.

To authenticate before the computer will start


B.

To answer a security question after login


C.

To authenticate before the computer's OS starts


D.

To regularly change passwords


Expert Solution
Questions # 24:

One of the Data Security Software Capability protections included in the Harmony Endpoint solution is

Options:

A.

Data Leak Firewall


B.

Memory Encryption


C.

Dynamic Data Protection


D.

Remote Access VPN


Expert Solution
Questions # 25:

What do Push Operations allow?

Options:

A.

Allows the Endpoint Security Management Server to operate independently of the Security Management Server


B.

Allow the Management Console to operate without installing policy


C.

Allow the Endpoint Security Management Server to push operations to client computers without installing policy


D.

Allow the Endpoint clients to push operations to other client computers without installing policy


Expert Solution
Questions # 26:

How many Endpoint Security Client Package types exist?

Options:

A.

There are two main package types: Initial Client Package and Endpoint Security Client Packages.


B.

There are two packages: one for Windows and one for MacOS.


C.

The administrator has to download all the appropriate packages from the UserCenter.


D.

There is only the initial package.


Expert Solution
Questions # 27:

In the POLICY Tab of the Harmony Endpoint portal for each software capability (Threat Prevention, Data Protection, etc.), rules can be created to protect endpoint machines. Choose the true statement.

Options:

A.

The default rule is a global rule that only applies to Computers. Rules for Users must be added manually by the administrator.


B.

There are no rules to start with, and administrators must create rules in order to deploy the capability policies, actions, and behavior.


C.

There are only rules for the Harmony Endpoint Firewall capability. All other capabilities only include Actions.


D.

The default rule is a global rule which applies to all users and computers in the organization.


Expert Solution
Questions # 28:

What do the machine's Endpoint Client GUI Overview page, Web Management, and debug logs show?

Options:

A.

The status of the client's FDE system setup only


B.

The deployment status of the client's policy download, user acquisition, FDE system setup, and encryption phases.


C.

The status of the client's policy downloads only


D.

The status of the client's encryption phases only


Expert Solution
Questions # 29:

What does the Check Point Support Center as your one-stop portal offer?

Options:

A.

UserMates offline discussion boards


B.

Technical Certification


C.

SecureKnowledge technical database


D.

Offloads


Expert Solution
Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions