Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Checkpoint 156-536 Dumps Questions Answers

Page: 1 / 7
Total 98 questions

Check Point Certified Harmony Endpoint Specialist - R81.20 (CCES) Questions and Answers

Question 1

External Policy Servers are placed between the Endpoint clients and the Endpoint Security Management Server. What benefit does the External Endpoint Policy Server bring?

Options:

A.

Cluster and Delta requests

B.

Heartbeat and synchronization requests

C.

Test packet and delta requests

D.

Polling beat and delta requests

Buy Now
Question 2

Endpoint’s Media Encryption (ME) Software Capability protects sensitive data on what, and how?

Options:

A.

Storage devices, removable media, and other input/output devices by requiring authorization before a user accesses the device

B.

Input/output devices using Anti-Malware

C.

Removable media and other input/output devices by using encryption methods

D.

Storage devices by requiring multi-factor authorization

Question 3

What does pre-boot protection require of users?

Options:

A.

To authenticate before the computer will start

B.

To answer a security question after login

C.

To authenticate before the computer's OS starts

D.

To regularly change passwords

Question 4

Where are quarantined files stored?

Options:

A.

On client computer, under C:\ProgramData\CheckPoint\Endpoint Security\Remediation\quarantine

B.

On client computer, under C:\ProgramData\CheckPoint\Harmony Endpoint Security\quarantine

C.

On Management server, under $FWDIR\sba\Remediation\quarantine

D.

On client computer, under C:\Program Files\CheckPoint\Endpoint Security\Remediation\quarantine

Question 5

How many security levels can you set when enabling Remote Help on pre-boot?

Options:

A.

Four levels - Low security, Medium security, High security, Very High security

B.

Two levels - Low and High security

C.

Three levels - Low security, Medium security, High security

D.

One and only level - enable or disable security

Question 6

Harmony Endpoint’s Full Disk Encryption (FDE) only allows access to authorized users using what?

Options:

A.

Multifaceted pre-boot capabilities

B.

Strong Passwords

C.

Single login

D.

Username verification

Question 7

What does Unauthenticated mode mean?

Options:

A.

Computers and users might present a security risk, but still have access.

B.

Computers and users are trusted based on their IP address and username.

C.

Computers and users have credentials, but they are not verified through AD.

D.

Computers and users are trusted based on the passwords and usernames only.

Question 8

In addition to passwords, what else does the pre-boot environment also support?

Options:

A.

Options for remote authentication method

B.

Options for multi-factor authentication methods

C.

Options for double-factor authentication method

D.

Options for single-factor authentication method

Question 9

How many digits are required in the FDE policy settings to enable a Very High-Security level for remote help on pre-boot?

Options:

A.

40 digits

B.

Maximum 30 digits

C.

24 digits

D.

Minimum 20 digits

Question 10

What is the default encryption algorithm in the Full Disk Encryption tab under Advanced Settings?

Options:

A.

AES-CBC 128 bit

B.

AES-CBC 256 bit

C.

XTS-AES 256 bit

D.

XTS-AES 128 bit

Question 11

Full Disk Encryption (FDE) protects data at rest stored on a Hard Drive.

Options:

A.

RAM Drive

B.

SMB Share

C.

NFS Share

D.

Hard Drive

Question 12

When deploying a policy server, which is important?

Options:

A.

To have policies in place

B.

To configure the heartbeat interval and define the amount of time that the client is allowed to connect to the server

C.

To configure the EPS and define the amount of time that the client is allowed to connect to the SMS

D.

To install the heartbeat server first

Question 13

Name one way to install Endpoint Security clients:

Options:

A.

Third-party deployment tools

B.

Automatic using the server deployment rules

C.

Package import

D.

Manual deployment using the internet

Question 14

What type of attack is Ransomware?

Options:

A.

Where a victim encrypts files on a computer and demands payment for decryption key from an attacker.

B.

Where an attacker encrypts files on a computer and demands payment for decryption key.

C.

Ransomware is not an attack.

D.

Where an attacker decrypts files on a computer and demands payment for encryption key.

Question 15

How can an administrator tell when the macOS Harmony Endpoint client is successfully installed?

Options:

A.

The Apple device will automatically reboot when the installation is complete. This is confirmation that the client is installed.

B.

The macOS will generate a pop-up message to notify the administrator.

C.

When the client is successfully installed, the Endpoint icon will appear in the computer's menu bar.

D.

The Harmony management portal will generate a pop-up in the portal to notify the administrator.

Question 16

Check Point Full Disk Encryption contains two main components - what are the two main components?

Options:

A.

Media Encryption & Pre-UEFI Authentication

B.

Disk Encryption & Pre-Boot Authentication

C.

Port Encryption & After-Boot Authentication

D.

Disk Encryption & 2FAAuthentication

Question 17

How many Endpoint Security Client Package types exist?

Options:

A.

There are two main package types: Initial Client Package and Endpoint Security Client Packages.

B.

There are two packages: one for Windows and one for MacOS.

C.

The administrator has to download all the appropriate packages from the UserCenter.

D.

There is only the initial package.

Question 18

What do Push Operations allow?

Options:

A.

Allows the Endpoint Security Management Server to operate independently of the Security Management Server

B.

Allow the Management Console to operate without installing policy

C.

Allow the Endpoint Security Management Server to push operations to client computers without installing policy

D.

Allow the Endpoint clients to push operations to other client computers without installing policy

Question 19

With which release of Endpoint Client is the Anti-Malware engine based on Sophos instead of Kaspersky?

Options:

A.

Endpoint Client release E86.26 and higher for Cloud deployments

B.

Endpoint Client release E84.40 and higher for all deployments

C.

Endpoint Client release E83.20 and higher for Cloud deployments

D.

Endpoint Client release E81.20 and higher for On-premises deployments

Question 20

What connection options does Connection Awareness support?

Options:

A.

There are two options: Connected and Disconnected

B.

Master and Slave Endpoint Security Management Server

C.

Client and Server model based on LDAP model. The supported ports are 389 and 636

D.

There are two options: Connected to Management and Connected to a List of Specified Targets

Question 21

Endpoint Security Clients are applications installed on company-owned desktop and laptop computers which include the following:

Options:

A.

Endpoint security software Capabilities and a device agent which operates as a container for the Capabilities and communicates with the Endpoint Management Server

B.

GUI client that connects to the Endpoint Security Management Server to manage the policy and other configuration for Endpoints

C.

Endpoint Security software Capabilities and a GUI client to manage policies for all capabilities

D.

GUI client that connects to the local Endpoint Capability Software to manage the policy and all other configuration for that Endpoint only

Question 22

Which command in a CLI session is used to check installed licenses on the Harmony Endpoint Management Server?

Options:

A.

cplic print -x

B.

show licenses all

C.

cplic add
D. cplic print +x

Question 23

Why is it critical to change the default Agent Uninstall Password?

Options:

A.

All passwords and critical data are protected by Full Disk Encryption. The Endpoint agent supports pre-boot authentication so nobody can bypass the agent’s security.

B.

There is no need to change it because only the local PC administrator can uninstall the agent.

C.

The default password used is easy to guess.

D.

You have to change the default Agent Uninstall Password because if you do not, it will be easy for a malware to uninstall the agent itself.

Question 24

Which of the following is not protected by the Full Disk Encryption (FDE) software?

    Client's user data

    Operating system files

    Temporary files

    Erased files

Options:

A.

Temporary and erased files

B.

All of these are protected with FDE

C.

Erased files

D.

Temporary files

Question 25

Which of the following is TRUE about the functions of Harmony Endpoint components?

Options:

A.

SmartEndpoint connects to the Check Point Security Management Server (SMS)

B.

SmartEndpoint Console connects to and manages the Endpoint Management Server (EMS)

C.

SmartConsole connects to and manages the Endpoint Management Server (EMS)

D.

Web Management Console for Endpoint connects to the Check Point Security Management Server (SMS)

Question 26

For most tasks, Endpoint clients communicate with the [X] and the [X] communicates with the EMS?

Options:

Options:

A.

SMS

B.

EPS

C.

NMS

D.

Management Server

Question 27

Which command in CLI session is used to check status of Check Point processes on Harmony Endpoint Management server?

Options:

A.

cpwd_admin list

B.

ps -aux | grep EPM

C.

show mgmt server state

D.

cpwd state

Question 28

What do the machine's Endpoint Client GUI Overview page, Web Management, and debug logs show?

Options:

A.

The status of the client's FDE system setup only

B.

The deployment status of the client's policy download, user acquisition, FDE system setup, and encryption phases.

C.

The status of the client's policy downloads only

D.

The status of the client's encryption phases only

Question 29

What is the command required to be run to start the Endpoint Web Interface for on-premises Harmony Endpoint Web Interface access?

Options:

A.

start_web_mgmt - run in dish

B.

start_web_mgmt - run in expert mode

C.

web_mgmt_start - run in expert mode

D.

web_mgmt_start - run in dish

Page: 1 / 7
Total 98 questions