Summer Sale- Special Discount Limited Time 65% Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Checkpoint 156-536 Check Point Certified Harmony Endpoint Specialist - R81.20 (CCES) Exam Practice Test

Page: 1 / 10
Total 98 questions

Check Point Certified Harmony Endpoint Specialist - R81.20 (CCES) Questions and Answers

Question 1

What capabilities does the Harmony Endpoint NGAV include?

Options:

A.

Anti-Ransomware, Anti-Exploit & Behavioral Guard

B.

Anti-IPS, Anti-Firewall & Anti-Guard

C.

Zero-Phishing, Anti-Bot & Anti-Virus

D.

Threat Extraction, Threat-Emulation & Zero-Phishing

Question 2

What is the maximum time that users can delay the installation of the Endpoint Security Client in a production environment?

Options:

A.

2 Hours

B.

30 minutes

C.

48 Hours

D.

8 Hours

Question 3

What communication protocol does Harmony Endpoint management use to communicate with the management server?

Options:

A.

SIC

B.

CPCOM

C.

TCP

D.

UDP

Question 4

Full Disk Encryption (FDE) protects data at rest stored on a Hard Drive.

Options:

A.

RAM Drive

B.

SMB Share

C.

NFS Share

D.

Hard Drive

Question 5

What is the default Agent Uninstall Password, which protects the client from unauthorized removal?

Options:

A.

Secret

B.

Chkp1234

C.

secret

D.

RemoveMe

Question 6

Which command in a CLI session is used to check installed licenses on the Harmony Endpoint Management Server?

Options:

A.

cplic print -x

B.

show licenses all

C.

cplic add
D. cplic print +x

Question 7

How is the Kerberos keytab file created?

Options:

A.

Using Kerberos principals

B.

Using the AD server

C.

Using encryption keys

D.

With the ktpass tool

Question 8

What do the machine's Endpoint Client GUI Overview page, Web Management, and debug logs show?

Options:

A.

The status of the client's FDE system setup only

B.

The deployment status of the client's policy download, user acquisition, FDE system setup, and encryption phases.

C.

The status of the client's policy downloads only

D.

The status of the client's encryption phases only

Question 9

Which User Roles are on the Endpoint Security Management Server for On-Premises servers?

Options:

A.

Primary Administrator and Read-Only

B.

Super Admin, Primary Administrator, User Admin, Read-Only

C.

Admin and Read-Only

D.

Super Admin, Read-Write All, Read-Only

Question 10

How many Endpoint Security Client Package types exist?

Options:

A.

There are two main package types: Initial Client Package and Endpoint Security Client Packages.

B.

There are two packages: one for Windows and one for MacOS.

C.

The administrator has to download all the appropriate packages from the UserCenter.

D.

There is only the initial package.

Question 11

What GUI options do you have to access the Endpoint Security Management Server in a cloud environment?

Options:

A.

Infinity Portal and Web Management Console

B.

SmartConsole and Gaia WebUI

C.

Nothing, there is no Cloud Support for Endpoint Management Server.

D.

SmartEndpoint Distributor

Question 12

Which of the following is TRUE about the functions of Harmony Endpoint components?

Options:

A.

SmartEndpoint connects to the Check Point Security Management Server (SMS)

B.

SmartEndpoint Console connects to and manages the Endpoint Management Server (EMS)

C.

SmartConsole connects to and manages the Endpoint Management Server (EMS)

D.

Web Management Console for Endpoint connects to the Check Point Security Management Server (SMS)

Question 13

The Remote Help tool can be used to assist users in password recovery. What type of assistance does this tool provide?

Options:

A.

The Remote Help tool only provides procedural information and FAQs about the Endpoint Security Client, including the procedure to reset the password

B.

The Remote Help tool provides:

a) User Logon Pre-boot Remote Help

b) Media Encryption Remote Help

C.

The Remote Help tool provides:

a) Link to the secret location of an encrypted password file

b) Key to decrypt the password file

D.

The Remote Help tool unlocks admin accounts on SmartEndpoint

Question 14

Which solution encrypts various types of removable storage media including USB drives, backup hard drives, and SD cards?

Options:

A.

Full Disk Encryption and File Recovery

B.

Endpoint’s Media Encryption (ME) Software Capability

C.

Media Encryption and Port Protection (MEPP)

D.

Full Recovery with Media Encryption

Question 15

What does Port Protection protect, and why?

Options:

A.

Activity on the ports of a client computer to help prevent data leakage

B.

Activity on the ports of a client computer to review logs

C.

Activity on the ports of a client computer to help unauthorized user access

D.

Activity on the ports of a client computer to monitor devices

Question 16

When deploying a policy server, which is important?

Options:

A.

To have policies in place

B.

To configure the heartbeat interval and define the amount of time that the client is allowed to connect to the server

C.

To configure the EPS and define the amount of time that the client is allowed to connect to the SMS

D.

To install the heartbeat server first

Question 17

On which search engines/web sites is the Safe Search feature supported in Harmony Endpoint?

Options:

A.

Google, Bing, Yahoo! by default, and extra support for Baidu, Yandex, Lycos, and Excite if the Harmony Endpoint Management is deployed in Cloud

B.

Google, Bing, and Yahoo!

C.

Google and Bing if the Harmony Endpoint Management is On-Premises deployment

D.

Google, Yahoo!, and OneSearch

Question 18

Does the Endpoint Client GUI provide automatic or manual prompting to protect removable storage media usage?

Options:

A.

Manual Only

B.

Either automatic or manual

C.

Automatic Only

D.

Neither automatic nor manual

Question 19

Which Endpoint capability ensures that protected computers comply with your organization's requirements and allows you to assign different security levels according to the compliance state of the endpoint computer?

Options:

A.

Compliance Check

B.

Capsule Cloud Compliance

C.

Forensics and Anti-Ransomware

D.

Full Disk Encryption

Question 20

To enforce the FDE policy, the following requirement must be met?

Options:

A.

The client must obtain an FDE machine-based policy

B.

The client must obtain an FDE certificate

C.

Deployments must consist of at least one post-boot user

D.

A recovery file must be encrypted

Question 21

Which permissions apply the same access level to the entire organization?

Options:

A.

Organization-wide permission settings

B.

Regional user permission settings

C.

Universal user permission settings

D.

Global user permission settings

Question 22

The Check Point Harmony Product Suite is a suite of security products that includes?

Options:

A.

Quantum Spark

B.

Harmony Mobile (On-Premises)

C.

Quantum Endpoint (Cloud)

D.

Harmony Endpoint (Cloud and On-Premises)

Question 23

How often does the AD scanner poll the server database for the current configuration settings?

Options:

A.

Every 60 minutes

B.

Every 150 minutes

C.

Every 120 minutes

D.

Every 30 minutes

Question 24

"Heartbeat" refers to what?

Options:

A.

A periodic client connection to the server

B.

A client connection that happens every 60 seconds

C.

A server connection that happens every 5 minutes

D.

A random server connection

Question 25

Why is it critical to change the default Agent Uninstall Password?

Options:

A.

All passwords and critical data are protected by Full Disk Encryption. The Endpoint agent supports pre-boot authentication so nobody can bypass the agent’s security.

B.

There is no need to change it because only the local PC administrator can uninstall the agent.

C.

The default password used is easy to guess.

D.

You have to change the default Agent Uninstall Password because if you do not, it will be easy for a malware to uninstall the agent itself.

Question 26

Name one way to install Endpoint Security clients:

Options:

A.

Third-party deployment tools

B.

Automatic using the server deployment rules

C.

Package import

D.

Manual deployment using the internet

Question 27

What does pre-boot protection require of users?

Options:

A.

To authenticate before the computer will start

B.

To answer a security question after login

C.

To authenticate before the computer's OS starts

D.

To regularly change passwords

Question 28

By default, an FDE Action does what?

Options:

A.

Rebuilds the hard drive

B.

Decrypts all visible disk volumes

C.

Encrypts all visible disk volumes

D.

Re-defines all visible disk volumes

Question 29

How can an administrator tell when the macOS Harmony Endpoint client is successfully installed?

Options:

A.

The Apple device will automatically reboot when the installation is complete. This is confirmation that the client is installed.

B.

The macOS will generate a pop-up message to notify the administrator.

C.

When the client is successfully installed, the Endpoint icon will appear in the computer's menu bar.

D.

The Harmony management portal will generate a pop-up in the portal to notify the administrator.

Page: 1 / 10
Total 98 questions