In the OVERVIEW Tab of the Harmony Endpoint portal which Overview shows the Active Alerts?
A. The Computer Management view
B. The Security Overview
C. The Operational Overview
D. The Policy Overview
正解:C
質問 2:
How many digits are required in the FDE policy settings to enable a Very High-Security level for remote help on pre-boot?
A. 40 digits
B. 24 digits
C. Minimum 20 digits
D. Maximum 30 digits
正解:B
質問 3:
Before installing FDE on a client machine, what should administrators make sure of?
A. That system volumes include at least 36 MB of continuous space
B. That system volumes include at least 50 MB of continuous space
C. That system volumes include at least 32 MB of continuous space
D. That system volumes include at least 25 MB of continuous space
正解:C
質問 4:
Which Endpoint capability ensures that protected computers comply with your organization's requirements and allows you to assign different security levels according to the compliance state of the endpoint computer
A. Full Disk Encryption
B. Compliance Check
C. Forensics and Anti-Ransomware
D. Capsule Cloud Compliance
正解:B
質問 5:
What GUI options do you have to access the Endpoint Security Management Server in a cloud environment?
A. SmartConsoleandGaiaWebUI
B. Nothing, there is no Cloud Support for Endpoint Management Server.
C. SmartEndpoint Distributor
D. Infinity Portal and Web Management Console
正解:D
質問 6:
When can administrators prepare the client for the FDE software package installation and deployment?
A. Once a client machine meets the minimum system requirements
B. Once the policy is installed
C. Once the client system volumes have 32 MB of space
D. Once a client meets the maximum system requirements
正解:A
質問 7:
How many Endpoint Security Client Package types exist?
A. There is only the initial package.
B. The administrator has to download all the appropriate packages from the UserCenter.
C. There are two packages. One for Windows and one for MacOS
D. There are two main package types. Initial Client Package and Endpoint Security Client Packages.
正解:D
質問 8:
What does Port Protection protect, and why?
A. Activity on the ports of a client computer to monitor devices
B. Activity on the ports of a client computer to review logs
C. Activity on the ports of a client computer to help unauthorized user access
D. Activity on the ports of a client computer to help prevent data leakage
正解:D
奈须** -
過去問題もしっかりついていて、これ一冊でかなり156-536合格に近づけそうです。しっかり頭に入る構成になっている。