Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Checkpoint 156-536 Dumps

Page: 1 / 10
Total 98 questions

Check Point Certified Harmony Endpoint Specialist - R81.20 (CCES) Questions and Answers

Question 1

Why is it critical to change the default Agent Uninstall Password?

Options:

A.

All passwords and critical data are protected by Full Disk Encryption. The Endpoint agent supports pre-boot authentication so nobody can bypass the agent’s security.

B.

There is no need to change it because only the local PC administrator can uninstall the agent.

C.

The default password used is easy to guess.

D.

You have to change the default Agent Uninstall Password because if you do not, it will be easy for a malware to uninstall the agent itself.

Question 2

When in the Strong Authentication workflow is the database installed on the secondary server?

Options:

A.

After Endpoint Security is enabled

B.

Before Endpoint Security is enabled

C.

Exactly when Endpoint Security is enabled

D.

After synchronization and before Endpoint Security has been enabled

Question 3

In a Standalone installation, the EMS is installed on the same computer or a different one than the NMS?

Options:

A.

Same

B.

Half on one and half on another computer

C.

Both

D.

Different

Question 4

Before installing FDE on a client machine, what should administrators make sure of?

Options:

A.

That system volumes include at least 32 MB of continuous space

B.

That system volumes include at least 50 MB of continuous space

C.

That system volumes include at least 36 MB of continuous space

D.

That system volumes include at least 25 MB of continuous space

Question 5

What does the Endpoint Security Homepage offer useful resources for?

Options:

A.

Complicated Practices

B.

Best Practices

C.

Unix Client OS Support

D.

Quantum Management

Question 6

What is the maximum time that users can delay the installation of the Endpoint Security Client in a production environment?

Options:

A.

2 Hours

B.

30 minutes

C.

48 Hours

D.

8 Hours

Question 7

In the OVERVIEW Tab of the Harmony Endpoint portal, which Overview shows the Active Alerts?

Options:

A.

The Policy Overview

B.

The Computer Management view

C.

The Operational Overview

D.

The Security Overview

Question 8

When deploying a policy server, which is important?

Options:

A.

To have policies in place

B.

To configure the heartbeat interval and define the amount of time that the client is allowed to connect to the server

C.

To configure the EPS and define the amount of time that the client is allowed to connect to the SMS

D.

To install the heartbeat server first

Question 9

Harmony Endpoint’s Full Disk Encryption (FDE) only allows access to authorized users using what?

Options:

A.

Multifaceted pre-boot capabilities

B.

Strong Passwords

C.

Single login

D.

Username verification

Question 10

Which of the following is not protected by the Full Disk Encryption (FDE) software?

    Client's user data

    Operating system files

    Temporary files

    Erased files

Options:

A.

Temporary and erased files

B.

All of these are protected with FDE

C.

Erased files

D.

Temporary files

Question 11

By default, Endpoint Security Manager is configured as which kind of server?

Options:

A.

Network Server

B.

Webserver

C.

Management Server

D.

Log Server

Question 12

Does the Endpoint Client GUI provide automatic or manual prompting to protect removable storage media usage?

Options:

A.

Manual Only

B.

Either automatic or manual

C.

Automatic Only

D.

Neither automatic nor manual

Question 13

What is the default encryption algorithm in the Full Disk Encryption tab under Advanced Settings?

Options:

A.

AES-CBC 128 bit

B.

AES-CBC 256 bit

C.

XTS-AES 256 bit

D.

XTS-AES 128 bit

Question 14

On which search engines/web sites is the Safe Search feature supported in Harmony Endpoint?

Options:

A.

Google, Bing, Yahoo! by default, and extra support for Baidu, Yandex, Lycos, and Excite if the Harmony Endpoint Management is deployed in Cloud

B.

Google, Bing, and Yahoo!

C.

Google and Bing if the Harmony Endpoint Management is On-Premises deployment

D.

Google, Yahoo!, and OneSearch

Question 15

What does the Data Protection/General rule contain?

Options:

A.

Actions that define user authentication settings only

B.

Actions that define decryption settings for hard disks

C.

Actions that restore encryption settings for hard disks and change user authentication settings

D.

Actions that define port protection settings and encryption settings for hard disks and removable media

Question 16

Which Endpoint capability ensures that protected computers comply with your organization's requirements and allows you to assign different security levels according to the compliance state of the endpoint computer?

Options:

A.

Compliance Check

B.

Capsule Cloud Compliance

C.

Forensics and Anti-Ransomware

D.

Full Disk Encryption

Question 17

Which information can we find on the Operational Overview dashboard?

Options:

A.

Active Attacks, Deployment status, Pre-boot status, Anti-Malware update, Harmony Endpoint Version, and Operating system

B.

Active Endpoints, Active Alerts, Deployment status, Pre-boot status, Encryption Status

C.

Hosts under Attack, Active Attacks, Blocked Attacks

D.

Desktops, Servers, Active Alerts, Anti-Malware update, Harmony Endpoint Version

Question 18

When can administrators prepare the client for the FDE software package installation and deployment?

Options:

A.

Once a client meets the maximum system requirements

B.

Once the policy is installed

C.

Once the client system volumes have 32 MB of space

D.

Once a client machine meets the minimum system requirements

Question 19

The Check Point Harmony Product Suite is a suite of security products that includes?

Options:

A.

Quantum Spark

B.

Harmony Mobile (On-Premises)

C.

Quantum Endpoint (Cloud)

D.

Harmony Endpoint (Cloud and On-Premises)

Question 20

What are the benefits of the Check Point Consolidated Cyber Security Architecture?

Options:

A.

Consolidated network functions

B.

Single policy

C.

Decentralized management

D.

Consolidated security functions

Question 21

What does pre-boot protection prevent?

Options:

A.

Unauthorized access to the Remote Help bypass tools or alternative boot technical support methods

B.

Unauthorized passwords or alternative "forgot passwords" methods during pre-boot

C.

Unauthorized users using post-boot methods

D.

Prevents unauthorized access to the operating system or bypass of boot protection

Question 22

What type of attack is Ransomware?

Options:

A.

Where a victim encrypts files on a computer and demands payment for decryption key from an attacker.

B.

Where an attacker encrypts files on a computer and demands payment for decryption key.

C.

Ransomware is not an attack.

D.

Where an attacker decrypts files on a computer and demands payment for encryption key.

Question 23

What does the Check Point Support Center as your one-stop portal offer?

Options:

A.

UserMates offline discussion boards

B.

Technical Certification

C.

SecureKnowledge technical database

D.

Offloads

Question 24

Is it possible to change the encryption algorithm on a fully encrypted disk, without need to decrypt it first? Is it possible to re-encrypt the disk on-the-fly?

Options:

A.

Changing the encryption algorithm is only supported on machines with legacy BIOS firmware. EFI or UEFI Firmware is not supported.

B.

Changing the encryption algorithm is supported on all machines, but you must first decrypt it, change encryption algorithm, and encrypt it again with new encryption algorithm.

C.

Changing the encryption algorithm is supported on all machines, no matter which firmware they have.

D.

Changing the encryption algorithm is only on machines that have EFI or IJEFI firmware. BIOS Firmware is not supported.

Question 25

Media Encryption and Port Protection (MEPP) provide strong encryption for removable media, such as?

Options:

A.

USB drives, CD/DVDs, and SD cards, and for external ports

B.

Cables and Ethernet cords

C.

External ports only

D.

USB drives and CD/DVDs

Question 26

What do the machine's Endpoint Client GUI Overview page, Web Management, and debug logs show?

Options:

A.

The status of the client's FDE system setup only

B.

The deployment status of the client's policy download, user acquisition, FDE system setup, and encryption phases.

C.

The status of the client's policy downloads only

D.

The status of the client's encryption phases only

Question 27

To enforce the FDE policy, the following requirement must be met?

Options:

A.

The client must obtain an FDE machine-based policy

B.

The client must obtain an FDE certificate

C.

Deployments must consist of at least one post-boot user

D.

A recovery file must be encrypted

Question 28

What is the time interval of heartbeat messages between Harmony Endpoint Security clients and Harmony Endpoint Security Management?

Options:

A.

60 milli-seconds

B.

60 minutes

C.

60 seconds

D.

30 seconds

Question 29

What does pre-boot protection require of users?

Options:

A.

To authenticate before the computer will start

B.

To answer a security question after login

C.

To authenticate before the computer's OS starts

D.

To regularly change passwords

Page: 1 / 10
Total 98 questions