156-536 Practice Test Questions

75 Questions


What communication protocol does Harmony Endpoint management use to communicate with the management server?


A. SIC


B. CPCOM


C. TCP


D. UDP





B.
  CPCOM

In the POLICY Tab of the Harmony Endpoint portal for each software Capability (Threat Prevention, Data Protection etc.) rules can be created to protect endpoint machines. Choose the true statement.


A. The default rule is a global rule that only applies to Computers. Rules for Users must be added manually by the administrator.


B. There are no rules to start with and administrators must create rules in order to deploy the capability policies, actions and behavior.


C. There are only rules for the Harmony Endpoint Firewall Capability. All other Capabilities only include Actions.


D. The default rule is a global rule which applies to all users and computers in the organization.





D.
  The default rule is a global rule which applies to all users and computers in the organization.

Which Endpoint capability ensures that protected computers comply with your organization's requirements and allows you to assign different security levels according to the compliance state of the endpoint computer


A. Compliance Check


B. Capsule Cloud Compliance


C. Forensics and Anti-Ransomware


D. Full Disk Encryption





A.
  Compliance Check

External Policy Servers are placed between the Endpoint clients and the Endpoint Security Management Server. How many Policy Servers are supported per environment?


A. From 1 to 25 Policy Servers are supported


B. From 1 to 15 Policy Servers are supported


C. From 1 to 20 Policy Servers are supported


D. From 1 to 5 Policy Servers are supported





A.
  From 1 to 25 Policy Servers are supported

What blades have to be enabled on the Management Server in order for the Endpoint Security Management Server to operate?


A. You can enable all gateway related blades.


B. The administrator has to enable compliance and Network Policy Management.


C. Logging & Status, SmartEvent Server, and SmartEvent Correlation unit must be enabled.


D. The SmartEndPoint super Node on the Management.





C.
  Logging & Status, SmartEvent Server, and SmartEvent Correlation unit must be enabled.

What is the default encryption algorithm in Full Disk Encryption tab under Advanced Settings?


A. AES-CBC 128 bit


B. AES-CBC 256 bit


C. XTS-AES 256 bit


D. XTS-AES 128 bit





C.
  XTS-AES 256 bit

If there are multiple EPS in an environment, what happens?


A. One Endpoint client automatically communicates with the server


B. Each Endpoint client automatically communicates with the EMS


C. Each Endpoint client does an analysis to find which EPS is "closest" and automatically communicates with that server.


D. Each Endpoint client automatically communicates with the SMS





C.
  Each Endpoint client does an analysis to find which EPS is "closest" and automatically communicates with that server.

What does pre-boot authentication disable?


A. Workarounds to computer security


B. Identity theft


C. Incorrect usernames


D. Weak passwords





A.
  Workarounds to computer security

Which User Roles are on the Endpoint Security Management Server for On-Premises servers?


A. Primary Administrator and Read-Only


B. Super Admin, Primary Administrator, User Admin, Read-Only


C. Admin and Read-Only


D. Super Admin, Read-Write All, Read-Only





B.
  Super Admin, Primary Administrator, User Admin, Read-Only

What does the Data protection/General rule contain?


A. Actions that define user authentication settings only


B. Actions that define decryption settings for hard disks


C. Actions that restore encryption settings for hard disks and change user authentication settings


D. Actions that define port protection settings and encryption settings for hard disks and removable media





D.
  Actions that define port protection settings and encryption settings for hard disks and removable media

What is the command required to be run to start the Endpoint Web Interface for on-premises Harmony Endpoint Web Interface access?


A. start_web_mgmt - run in dish


B. start_web_mgmt - run in expert mode


C. web_mgmt_start - run in expert mode


D. web_mgmt_start - run in dish





A.
  start_web_mgmt - run in dish

What happens to clients that fail to meet the requirements?


A. They have unenforced protections


B. They have encryption issues


C. They do not receive FDE protections


D. They receive incomplete protections





C.
  They do not receive FDE protections


Page 2 out of 7 Pages
Previous