Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: chrismas

156-536 Check Point Certified Harmony Endpoint Specialist - R81.20 (CCES) Questions and Answers

Questions 4

What does pre-boot authentication disable?

Options:

A.

Workarounds to computer security

B.

Identity theft

C.

Incorrect usernames

D.

Weak passwords

Buy Now
Questions 5

What is the command required to be run to start the Endpoint Web Interface for on-premises Harmony Endpoint Web Interface access?

Options:

A.

start_web_mgmt - run in dish

B.

start_web_mgmt - run in expert mode

C.

web_mgmt_start - run in expert mode

D.

web_mgmt_start - run in dish

Buy Now
Questions 6

What happens to clients that fail to meet the requirements?

Options:

A.

They have unenforced protections

B.

They have encryption issues

C.

They do not receive FDE protections

D.

They receive incomplete protections

Buy Now
Questions 7

The Remote Help tool can be used to assist users in password recovery. What type of assistance does this tool provide

Options:

A.

The Remote Help only provides procedural information and FAQs about the Endpoint Security Client including procedure to reset password

B.

The Remote Help tool provides

a) User Logon Pre-boot Remote Help

b) Media Encryption Remote Help

C.

The Remote Help tool provides

a) Link to the secret location of encrypted password file

b) Key to decrypt the password file

D.

The Remote Help tool unlocks admin accounts on SmartEndpoint

Buy Now
Questions 8

Which command in CLI session is used to check installed licenses on Harmony Endpoint Management server?

Options:

A.

cplic print-x

B.

show licenses all

C.

cplic add

D.

cplic print +x

Buy Now
Questions 9

How is the Kerberos key tab file created?

Options:

A.

Using Kerberos principals

B.

Using the AD server

C.

Using encryption keys

D.

With the ktpass tool

Buy Now
Questions 10

What are the General components of Data Protection?

Options:

A.

Data protection includes VPN. and Firewall capabilities.

B.

Full Disk Encryption (FDE). Media Encryption and Port Protection.

C.

it supports SmartCard Authentication and Pre-Boot encryption.

D.

Only OneCheck in Pre-Boot environment.

Buy Now
Questions 11

Where are the Endpoint policy servers located?

Options:

A.

Between the Endpoint clients and the EPS

B.

Between the Endpoint clients and the EMS

C.

Between the Endpoint clients and the NMS

D.

Between the Endpoint clients and the SMS

Buy Now
Questions 12

In the POLICY Tab of the Harmony Endpoint portal for each software Capability (Threat Prevention, Data Protection etc.) rules can be created to protect endpoint machines. Choose the true statement.

Options:

A.

The default rule is a global rule that only applies to Computers. Rules for Users must be added manually by the administrator.

B.

There are no rules to start with and administrators must create rules in order to deploy the capability policies, actions and behavior.

C.

There are only rules for the Harmony Endpoint Firewall Capability. All other Capabilities only include Actions.

D.

The default rule is a global rule which applies to all users and computers in the organization.

Buy Now
Questions 13

As an Endpoint Administrator you are facing with some errors related to AD Strong Authentication in Endpoint Management server. Where is the right place to look when you are troubleshooting these issues?

Options:

A.

$FWDIR/log/Authentication.log

B.

$FWDIR/logs/Auth.log

C.

$UEPMDIR/logs/Authentication.log

D.

$UEMPDlR/log/Authentication.elg

Buy Now
Questions 14

You must make a decision of which FDE algorithm to be used by one of your clients who specializes in multimedia video editing. What algorithm will you choose?

Options:

A.

The implementation of a Secure VPN with very strong encryption will make your data invisible in cases of live internet transmission.

B.

In Multimedia applications you do not need to implement any kind of Full disk encryption. You can use software like 7Zip in order to encrypt your data.

C.

Any kind of data is very important and the Full Disk Encryption technic must be used with the strongest secret key possible. Your client has to use strong encryption like XTS-AES 256 bit.

D.

Video processing is a high bandwidth application which utilizes a lot of HDD access time. You have to use a FDE algorithm with small secret key like XTS-AES 128 bit.

Buy Now
Questions 15

What capabilities does the Harmony Endpoint NGAV include?

Options:

A.

Anti-Ransomware, Anti-Exploit & Behavioral Guard

B.

Anti-IPS, Anti-Firewall & Anti-Guard

C.

Zero-Phishing, Anti-Bot& Anti-Virus

D.

Threat Extraction, Threat-Emulation & Zero-Phishing

Buy Now
Questions 16

External Policy Servers are placed between the Endpoint clients and the Endpoint Security Management Server. What benefit does the External Endpoint Policy Server bring?

Options:

A.

Cluster and Delta requests

B.

Heartbeat and synchronization requests

C.

Test packet and delta requests

D.

Polling beat and delta requests

Buy Now
Questions 17

With which release of Endpoint Client is the Anti-Malware engine based on Sophos instead to Kaspersky?

Options:

A.

Endpoint Client release E86.26 and higher for Cloud deployments

B.

Endpoint Client release E84.40 and higher for all deployments

C.

Endpoint Client release E83.20 and higher for Cloud deployments

D.

Endpoint Client release E81.20 and higher for On-premises deployments

Buy Now
Questions 18

What blades have to be enabled on the Management Server in order for the Endpoint Security Management Server to operate?

Options:

A.

You can enable all gateway related blades.

B.

The administrator has to enable compliance and Network Policy Management.

C.

Logging & Status, SmartEvent Server, and SmartEvent Correlation unit must be enabled.

D.

The SmartEndPoint super Node on the Management.

Buy Now
Questions 19

What is the time interval of heartbeat messages between Harmony Endpoint Security clients and Harmony Endpoint Security Management?

Options:

A.

60 milli-seconds

B.

60 minutes

C.

60 seconds

D.

30 seconds

Buy Now
Questions 20

What are the benefits of the Check Point Consolidated Cyber Security Architecture?

Options:

A.

Consolidated network functions

B.

Single policy

C.

decentralized management

D.

Consolidated security functions

Buy Now
Questions 21

Which of the following is TRUE about the functions of Harmony Endpoint components

Options:

A.

SmartEndpoint connects to the Check Point Security Management Server (SMS)

B.

SmartEndpoint Console connects to and manages the Endpoint Management Server (EMS)

C.

SmartConsole connects to and manages the Endpoint Management Server (EMS)

D.

Web Management Console for Endpoint connects to the Check Point Security Management Server

(SMS)

Buy Now
Questions 22

Which of the following is not protected by the Full Disk Encryption (FDE) software

1) Client's user data

2) Operating system files

3) Temporary files

4) Erased files

Options:

A.

Temporary and erased files

B.

All of these are protected with FDE

C.

Erased files

D.

Temporary files

Buy Now
Exam Code: 156-536
Exam Name: Check Point Certified Harmony Endpoint Specialist - R81.20 (CCES)
Last Update: Oct 21, 2024
Questions: 75

PDF + Testing Engine

$48  $159.99

Testing Engine

$36  $119.99
buy now 156-536 testing engine

PDF (Q&A)

$30  $99.99
buy now 156-536 pdf