Which User Roles are on the Endpoint Security Management Server for On-Premises servers?
A. Primary Administrator and Read-Only
B. Super Admin, Primary Administrator, User Admin, Read-Only
C. Admin and Read-Only
D. Super Admin, Read-Write All, Read-Only
What does the Data protection/General rule contain?
A. Actions that define user authentication settings only
B. Actions that define decryption settings for hard disks
C. Actions that restore encryption settings for hard disks and change user authentication settings
D. Actions that define port protection settings and encryption settings for hard disks and removable media
What is the command required to be run to start the Endpoint Web Interface for on-premises Harmony Endpoint Web Interface access?
A. start_web_mgmt - run in dish
B. start_web_mgmt - run in expert mode
C. web_mgmt_start - run in expert mode
D. web_mgmt_start - run in dish
What happens to clients that fail to meet the requirements?
A. They have unenforced protections
B. They have encryption issues
C. They do not receive FDE protections
D. They receive incomplete protections
Which command in CLI session is used to check installed licenses on Harmony Endpoint Management server?
A. cplic print-x
B. show licenses all
C. cplic add
D. cplic print +x
Page 5 out of 15 Pages |
Previous |