Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the Checkpoint CCES 156-536 Questions and answers with ValidTests

Exam 156-536 All Questions
Exam 156-536 Premium Access

View all detail and faqs for the 156-536 exam

Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions
Questions # 21:

External Endpoint Policy Servers (EPS) decrease X and reduce X between sites?

Options:

A.

Decrease policies and reduce traffic between sites

B.

Decrease power and reduce accidents between sites

C.

Decrease clients and reduce device agents between sites

D.

External Endpoint Policy Servers (EPS) decrease the load of the EMS and reduce the bandwidth required between sites

Expert Solution
Questions # 22:

In the POLICY Tab of the Harmony Endpoint portal for each software capability (Threat Prevention, Data Protection, etc.), rules can be created to protect endpoint machines. Choose the true statement.

Options:

A.

The default rule is a global rule that only applies to Computers. Rules for Users must be added manually by the administrator.

B.

There are no rules to start with, and administrators must create rules in order to deploy the capability policies, actions, and behavior.

C.

There are only rules for the Harmony Endpoint Firewall capability. All other capabilities only include Actions.

D.

The default rule is a global rule which applies to all users and computers in the organization.

Expert Solution
Questions # 23:

How many Endpoint Security Client Package types exist?

Options:

A.

There are two main package types: Initial Client Package and Endpoint Security Client Packages.

B.

There are two packages: one for Windows and one for MacOS.

C.

The administrator has to download all the appropriate packages from the UserCenter.

D.

There is only the initial package.

Expert Solution
Questions # 24:

On which search engines/web sites is the Safe Search feature supported in Harmony Endpoint?

Options:

A.

Google, Bing, Yahoo! by default, and extra support for Baidu, Yandex, Lycos, and Excite if the Harmony Endpoint Management is deployed in Cloud

B.

Google, Bing, and Yahoo!

C.

Google and Bing if the Harmony Endpoint Management is On-Premises deployment

D.

Google, Yahoo!, and OneSearch

Expert Solution
Questions # 25:

You're going to prepare a Deployment Scenario of an Endpoint Security Client on a Windows machine in an On-Prem environment. You choose one of two basic deployments - which is typical for a local deployment?

Options:

A.

Agent (Initial Client) package only

B.

Agent (Initial Client) and Software Blades packages

C.

Agent-less (no Client) and Software Blades packages

D.

Agent (free Client) package only

Expert Solution
Questions # 26:

When is the heartbeat initiated?

Options:

A.

During the first sync

B.

After the last sync

C.

Before the first sync

D.

After the first sync

Expert Solution
Questions # 27:

How often does the AD scanner poll the server database for the current configuration settings?

Options:

A.

Every 60 minutes

B.

Every 150 minutes

C.

Every 120 minutes

D.

Every 30 minutes

Expert Solution
Questions # 28:

Which permissions apply the same access level to the entire organization?

Options:

A.

Organization-wide permission settings

B.

Regional user permission settings

C.

Universal user permission settings

D.

Global user permission settings

Expert Solution
Questions # 29:

What does the Data Protection/General rule contain?

Options:

A.

Actions that define user authentication settings only

B.

Actions that define decryption settings for hard disks

C.

Actions that restore encryption settings for hard disks and change user authentication settings

D.

Actions that define port protection settings and encryption settings for hard disks and removable media

Expert Solution
Questions # 30:

How does Full Disk Encryption (FDE) add another layer of security?

Options:

A.

By offering media encryption

B.

By offering pre-boot protection

C.

By offering port protection

D.

By offering encryption

Expert Solution
Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions