Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Checkpoint 156-715.70 Exam - Cheat-Test.com

Free 156-715.70 Sample Questions:

Q: 1
How many authorized logins are needed to create recovery media in Full Disk Encryption?
A. One
B. Four
C. Three
D. Two
Answer: D

Q: 2
What are the names of the Full Disk Encryption processes and services that run on a workstation after FDE has been installed?
A. Pssogina.exe, protect.exe and p95tray.exe
B. Decrypt.exe, protect.exe, pssogina.exe, and pagents.exe
C. Prot_srv.exe, p95tray.exe and pstartsr.exe
D. pagents.exe, psadmin.exe and decrypt.exe
Answer: C

Q: 3
Which of the three Full Disk Encryption services running on the local machine provides encryption and decryption during install and uninstall?
A. Prot_srv.exe
B. PstartSr.exe
C. P95Tray.exe
Answer: A

Q: 4
Which of the three Full Disk Encryption services running on the local machine allows Full Disk Encryption to push recovery files and poll for update profiles?
A. PstartSr.exe
B. Prot_srv.exe
C. P95Tray.exe
Answer: C

Q: 5
From which of the three Full Disk Encryption services running on the local machine is the monitoring program accessible to end users?
A. Prot_srv.exe
B. P95Tray.exe
C. PstartSr.exe
Answer: B

Q: 6
"Data at rest" exists in all the following scenarios, EXCEPT:
A. For data stored on a Full Disk Encryption protected internal hard drive.
B. For data residing in swap files for Full Disk Encryption protected applications.
C. For data not in use by a Full Disk Encryption protected application.
D. For data in use by a Full Disk Encryption protected application.
Answer: D

Q: 7
Which data-protection method provides an effective deterrent to illicit network access via networkconnected machines, especially if these machines are linked as part of a VPN?
A. File encryption
B. Full disk encryption
C. User authentication
D. Boot protection
Answer: C

Q: 8
Which of the following answers is NOT a correct description of aspects of the drive-encryption process?
A. Encryption takes place only AFTER the Recovery file is off-loaded.
B. Encryption functions as a throttled background service.
C. Moving your mouse over the FDE icon will show the amount of the drive encrypted.
D. The amount of data encrypted per hour is dependant on the amount of free drive space available.
Answer: A

Q: 9
Which of the following accurately describes the boot process on a Full Disk Encryption equipped system?
A. POST, BIOS, MBR, MFAE, PBR
B. POST, BIOS, MBR, PBR, PPBE
C. POST, BIOS, MFAE, MBR, PBR
D. POST, BIOS, MBR, PBR, MFAE
Answer: B

Q: 10
Which of the following examples is NOT a risk associated with a hard drive that is only protected with Boot Protection/Authentication?
A. Brute force attacks by linking the drive to a separate bootable drive.
B. Bypassing the protection by booting from a floppy.
C. Illicit access to the drive, which can be gained via network connectivity.
D. BIOS passwords, which are weak and susceptible to attacks.
Answer: C

Q: 11
What is the maximum number of events that can be stored in the Full Disk Encryption local-event Data Base?
A. 510
B. 256
C. 512
D. 255
Answer: D

Q: 12
Which is a requirement to run the Full Disk Encryption Management Console?
A. Windows Server 2000 or above
B. MDAC 2.7
C. NET Framework 1.0 or above
D. NET Framework 2.0 or above
Answer: D


© 2014 Cheat-Test.com, All Rights Reserved