Free Download Lastest Pass4sure Check Point CCSE 156-715.70 exam Questions

Check Point Certified Endpoint Expert R70 (Combined SA, FDE, MI, ME): 156-715.70 Exam
156-715.70 Questions & Answers
Exam Code: 156-715.70
Exam Name: Check Point Certified Endpoint Expert R70 (Combined SA, FDE, MI, ME)
Q & A: 382 Q&As

QUESTION 1
How many authorized logins are needed to create recovery media in Full Disk Encryption?
A. One
B. Four
C. Three
D. Two
Answer: D

QUESTION 2
What are the names of the Full Disk Encryption processes and services that run on a workstation
after FDE has been installed?
A. Pssogina.exe, protect.exe and p95tray.exe
B. Decrypt.exe, protect.exe, pssogina.exe, and pagents.exe
C. Prot_srv.exe, p95tray.exe and pstartsr.exe
D. pagents.exe, psadmin.exe and decrypt.exe
Answer: C

QUESTION 3
Which of the three Full Disk Encryption services running on the local machine provides encryption
and decryption during install and uninstall?
A. Prot_srv.exe
B. PstartSr.exe
C. P95Tray.exe
Answer: A

QUESTION 4
Which of the three Full Disk Encryption services running on the local machine allows Full Disk
Encryption to push recovery files and poll for update profiles?
A. PstartSr.exe
B. Prot_srv.exe
C. P95Tray.exe
Answer: C

QUESTION 5
From which of the three Full Disk Encryption services running on the local machine is the
monitoring program accessible to end users?
A. Prot_srv.exe
B. P95Tray.exe
C. PstartSr.exe
Answer: B

QUESTION 6
“Data at rest” exists in all the following scenarios, EXCEPT:
A. For data stored on a Full Disk Encryption protected internal hard drive.
B. For data residing in swap files for Full Disk Encryption protected applications.
C. For data not in use by a Full Disk Encryption protected application.
D. For data in use by a Full Disk Encryption protected application.
Answer: D

QUESTION 7
Which data-protection method provides an effective deterrent to illicit network access via networkconnected machines, especially if these machines are linked as part of a VPN?
A. File encryption
B. Full disk encryption
C. User authentication
D. Boot protection
Answer: C

QUESTION 8
Which of the following answers is NOT a correct description of aspects of the drive-encryption
process?
A. Encryption takes place only AFTER the Recovery file is off-loaded.
B. Encryption functions as a throttled background service.
C. Moving your mouse over the FDE icon will show the amount of the drive encrypted.
D. The amount of data encrypted per hour is dependent on the amount of free drive space
available.
Answer: A

QUESTION 9
Which of the following accurately describes the boot process on a Full Disk Encryption equipped
system?
A. POST, BIOS, MBR, MFAE, PBR
B. POST, BIOS, MBR, PBR, PPBE
C. POST, BIOS, MFAE, MBR, PBR
D. POST, BIOS, MBR, PBR, MFAE
Answer: B

QUESTION 10
Which of the following examples is NOT a risk associated with a hard drive that is only protected with Boot Protection/Authentication?
A. Brute force attacks by linking the drive to a separate bootable drive.
B. Bypassing the protection by booting from a floppy.
C. Illicit access to the drive, which can be gained via network connectivity.
D. BIOS passwords, which are weak and susceptible to attacks.
Answer: C

…go to http://www.lead2pass.com/156-715-70.html to download the lastest full version.