Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the Checkpoint CCES 156-536 Questions and answers with ValidTests

Exam 156-536 All Questions
Exam 156-536 Premium Access

View all detail and faqs for the 156-536 exam

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

What happens to clients that fail to meet the requirements?

Options:

A.

They have unenforced protections

B.

They have encryption issues

C.

They do not receive FDE protections

D.

They receive incomplete protections

Expert Solution
Questions # 12:

What does the Data protection/General rule contain?

Options:

A.

Actions that define user authentication settings only

B.

Actions that define decryption settings for hard disks

C.

Actions that restore encryption settings for hard disks and change user authentication settings

D.

Actions that define port protection settings and encryption settings for hard disks and removable media

Expert Solution
Questions # 13:

When using User Logon Pre-boot Remote Help, the following assistance is provided:

Options:

A.

Only One-Time Logon

B.

One-Time Logon and Remote Password Change

C.

Cleartext Password

D.

Only Remote Password Change

Expert Solution
Questions # 14:

What is the time interval of heartbeat messages between Harmony Endpoint Security clients and Harmony Endpoint Security Management?

Options:

A.

60 milli-seconds

B.

60 minutes

C.

60 seconds

D.

30 seconds

Expert Solution
Questions # 15:

What capabilities does the Harmony Endpoint NGAV include?

Options:

A.

Anti-Ransomware, Anti-Exploit & Behavioral Guard

B.

Anti-IPS, Anti-Firewall & Anti-Guard

C.

Zero-Phishing, Anti-Bot & Anti-Virus

D.

Threat Extraction, Threat-Emulation & Zero-Phishing

Expert Solution
Questions # 16:

Is it possible to change the encryption algorithm on a fully encrypted disk, without need to decrypt it first? Is it possible to re-encrypt the disk on-the-fly?

Options:

A.

Changing the encryption algorithm is only supported on machines with legacy BIOS firmware. EFI or UEFI Firmware is not supported.

B.

Changing the encryption algorithm is supported on all machines, but you must first decrypt it, change encryption algorithm, and encrypt it again with new encryption algorithm.

C.

Changing the encryption algorithm is supported on all machines, no matter which firmware they have.

D.

Changing the encryption algorithm is only on machines that have EFI or IJEFI firmware. BIOS Firmware is not supported.

Expert Solution
Questions # 17:

What does Port Protection protect, and why?

Options:

A.

Activity on the ports of a client computer to help prevent data leakage

B.

Activity on the ports of a client computer to review logs

C.

Activity on the ports of a client computer to help unauthorized user access

D.

Activity on the ports of a client computer to monitor devices

Expert Solution
Questions # 18:

For most tasks, Endpoint clients communicate with the [X] and the [X] communicates with the EMS?

Options:

Options:

A.

SMS

B.

EPS

C.

NMS

D.

Management Server

Expert Solution
Questions # 19:

Where are the Endpoint Policy Servers located?

Options:

A.

Between the Endpoint clients and the EPS

B.

Between the Endpoint clients and the EMS

C.

Between the Endpoint clients and the NMS

D.

Between the Endpoint clients and the SMS

Expert Solution
Questions # 20:

The CISO office evaluates Check Point Harmony Endpoint and needs to know what kind of post-infection capabilities exist. Which post-infection capabilities does the Harmony Endpoint Suite include?

Options:

A.

IPS Attack Analysis (Forensics), Deploy and Destroy, and Isolation

B.

Automated Attack Analysis (Forensics), Remediation and Response, and Quarantine

C.

FW Attack Analysis (Forensics), Detect and Prevent, and Isolation

D.

IPS Attack Analysis (Forensics), Detect and Prevent, and Isolation

Expert Solution
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions