Summer Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Checkpoint 156-536 Check Point Certified Harmony Endpoint Specialist - R81.20 (CCES) Exam Practice Test

Page: 1 / 10
Total 98 questions

Check Point Certified Harmony Endpoint Specialist - R81.20 (CCES) Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$43.75  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$38.5  $109.99
Question 1

Which command in a CLI session is used to check installed licenses on the Harmony Endpoint Management Server?

Options:

A.

cplic print -x

B.

show licenses all

C.

cplic add
D. cplic print +x

Question 2

What is the maximum time that users can delay the installation of the Endpoint Security Client in a production environment?

Options:

A.

2 Hours

B.

30 minutes

C.

48 Hours

D.

8 Hours

Question 3

You're going to prepare a Deployment Scenario of an Endpoint Security Client on a Windows machine in an On-Prem environment. You choose one of two basic deployments - which is typical for a local deployment?

Options:

A.

Agent (Initial Client) package only

B.

Agent (Initial Client) and Software Blades packages

C.

Agent-less (no Client) and Software Blades packages

D.

Agent (free Client) package only

Question 4

Before installing the Endpoint Security Management Server, it is necessary to consider this:

Options:

A.

A Network Security Management Server must be installed.

B.

A Network Security Management Server must NOT be installed on the same machine.

C.

An Endpoint Security Gateway must be installed.

D.

MS SQL Server must be available with full admin access.

Question 5

When is the heartbeat initiated?

Options:

A.

During the first sync

B.

After the last sync

C.

Before the first sync

D.

After the first sync

Question 6

Media Encryption and Port Protection (MEPP) provide strong encryption for removable media, such as?

Options:

A.

USB drives, CD/DVDs, and SD cards, and for external ports

B.

Cables and Ethernet cords

C.

External ports only

D.

USB drives and CD/DVDs

Question 7

What does FDE software combine to authorize access to data on desktop computers and laptops?

Options:

A.

Post-logon authentication and encryption

B.

OS boot protection with pre-boot authentication and encryption

C.

OS boot protection and post-boot authentication

D.

Decryption

Question 8

Which of the following is TRUE about the functions of Harmony Endpoint components?

Options:

A.

SmartEndpoint connects to the Check Point Security Management Server (SMS)

B.

SmartEndpoint Console connects to and manages the Endpoint Management Server (EMS)

C.

SmartConsole connects to and manages the Endpoint Management Server (EMS)

D.

Web Management Console for Endpoint connects to the Check Point Security Management Server (SMS)

Question 9

The Push Operation Wizard allows users to select which three topics for Push Operations?

Options:

A.

Anti-Malware, Forensics and Remediation, Agent Settings

B.

Anti-Virus, Remediation, Agent Settings

C.

Anti-Malware, Analysis, Agent Deployment

D.

Anti-Ransomware, Forensics and Analysis, Agent Configurations

Question 10

Which Harmony Endpoint environment is better choice for companies looking for more control when deploying the product?

Options:

A.

On-premises environment, because it offers more options for client deployments and features, same control over the operations as in Cloud environment but is more costly to support.

B.

Both On-premises and Cloud environment is the right choice. Both offer same control over the operations, when deploying the product only difference is in support cost.

C.

Cloud environment, because it offers easier deployment of servers, offers same control over operations as in On-premises environments, but is not as costly to support.

D.

On-premises environment, because it offers more options for deployment, greater control over operations, but is also more costly to support.

Question 11

Endpoint Security Clients are applications installed on company-owned desktop and laptop computers which include the following:

Options:

A.

Endpoint security software Capabilities and a device agent which operates as a container for the Capabilities and communicates with the Endpoint Management Server

B.

GUI client that connects to the Endpoint Security Management Server to manage the policy and other configuration for Endpoints

C.

Endpoint Security software Capabilities and a GUI client to manage policies for all capabilities

D.

GUI client that connects to the local Endpoint Capability Software to manage the policy and all other configuration for that Endpoint only

Question 12

Check Point Full Disk Encryption contains two main components - what are the two main components?

Options:

A.

Media Encryption & Pre-UEFI Authentication

B.

Disk Encryption & Pre-Boot Authentication

C.

Port Encryption & After-Boot Authentication

D.

Disk Encryption & 2FAAuthentication

Question 13

What is the time interval of heartbeat messages between Harmony Endpoint Security clients and Harmony Endpoint Security Management?

Options:

A.

60 milli-seconds

B.

60 minutes

C.

60 seconds

D.

30 seconds

Question 14

To enforce the FDE policy, the following requirement must be met?

Options:

A.

The client must obtain an FDE machine-based policy

B.

The client must obtain an FDE certificate

C.

Deployments must consist of at least one post-boot user

D.

A recovery file must be encrypted

Question 15

When using User Logon Pre-boot Remote Help, the following assistance is provided:

Options:

A.

Only One-Time Logon

B.

One-Time Logon and Remote Password Change

C.

Cleartext Password

D.

Only Remote Password Change

Question 16

Which command in CLI session is used to check status of Check Point processes on Harmony Endpoint Management server?

Options:

A.

cpwd_admin list

B.

ps -aux | grep EPM

C.

show mgmt server state

D.

cpwd state

Question 17

What are the benefits of the Check Point Consolidated Cyber Security Architecture?

Options:

A.

Consolidated network functions

B.

Single policy

C.

Decentralized management

D.

Consolidated security functions

Question 18

What are the general components of Data Protection?

Options:

A.

Data protection includes VPN and Firewall capabilities.

B.

Full Disk Encryption (FDE), Media Encryption, and Port Protection.

C.

It supports SmartCard Authentication and Pre-Boot encryption.

D.

Only OneCheck in Pre-Boot environment.

Question 19

On which desktop operating systems are Harmony Endpoint Clients supported?

Options:

A.

Windows, macOS, Linux and Unix

B.

Only Windows and macOS

C.

Windows Servers and Clients, macOS and Linux

D.

Windows Client, macOS and Linux

Question 20

How many security levels can you set when enabling Remote Help on pre-boot?

Options:

A.

Four levels - Low security, Medium security, High security, Very High security

B.

Two levels - Low and High security

C.

Three levels - Low security, Medium security, High security

D.

One and only level - enable or disable security

Question 21

What does pre-boot protection require of users?

Options:

A.

To authenticate before the computer will start

B.

To answer a security question after login

C.

To authenticate before the computer's OS starts

D.

To regularly change passwords

Question 22

When in the Strong Authentication workflow is the database installed on the secondary server?

Options:

A.

After Endpoint Security is enabled

B.

Before Endpoint Security is enabled

C.

Exactly when Endpoint Security is enabled

D.

After synchronization and before Endpoint Security has been enabled

Question 23

"Heartbeat" refers to what?

Options:

A.

A periodic client connection to the server

B.

A client connection that happens every 60 seconds

C.

A server connection that happens every 5 minutes

D.

A random server connection

Question 24

What is the command required to be run to start the Endpoint Web Interface for on-premises Harmony Endpoint Web Interface access?

Options:

A.

start_web_mgmt - run in dish

B.

start_web_mgmt - run in expert mode

C.

web_mgmt_start - run in expert mode

D.

web_mgmt_start - run in dish

Question 25

When can administrators prepare the client for the FDE software package installation and deployment?

Options:

A.

Once a client meets the maximum system requirements

B.

Once the policy is installed

C.

Once the client system volumes have 32 MB of space

D.

Once a client machine meets the minimum system requirements

Question 26

Which Endpoint capability ensures that protected computers comply with your organization's requirements and allows you to assign different security levels according to the compliance state of the endpoint computer?

Options:

A.

Compliance Check

B.

Capsule Cloud Compliance

C.

Forensics and Anti-Ransomware

D.

Full Disk Encryption

Question 27

What is the default encryption algorithm in the Full Disk Encryption tab under Advanced Settings?

Options:

A.

AES-CBC 128 bit

B.

AES-CBC 256 bit

C.

XTS-AES 256 bit

D.

XTS-AES 128 bit

Question 28

The Check Point Harmony Product Suite is a suite of security products that includes?

Options:

A.

Quantum Spark

B.

Harmony Mobile (On-Premises)

C.

Quantum Endpoint (Cloud)

D.

Harmony Endpoint (Cloud and On-Premises)

Question 29

What does the Data Protection/General rule contain?

Options:

A.

Actions that define user authentication settings only

B.

Actions that define decryption settings for hard disks

C.

Actions that restore encryption settings for hard disks and change user authentication settings

D.

Actions that define port protection settings and encryption settings for hard disks and removable media

Page: 1 / 10
Total 98 questions