Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Checkpoint 156-536 Dumps

Page: 1 / 8
Total 75 questions

Check Point Certified Harmony Endpoint Specialist - R81.20 (CCES) Questions and Answers

Question 1

When in the Strong Authentication workflow is the database installed on the secondary server?

Options:

A.

After Endpoint security is enabled

B.

Before Endpoint security is enabled

C.

Exactly when Endpoint security is enabled

D.

After synchronization and before Endpoint security has been enabled

Question 2

What does Unauthenticated mode mean?

Options:

A.

Computers and users might present a security risk, but still have access.

B.

Computers and users are trusted based on their IP address and username.

C.

Computers and users have credentials, but they are not verified through AD.

D.

Computers and users are trusted based on the passwords and usernames only.

Question 3

Which User Roles are on the Endpoint Security Management Server for On-Premises servers?

Options:

A.

Primary Administrator and Read-Only

B.

Super Admin, Primary Administrator, User Admin, Read-Only

C.

Admin and Read-Only

D.

Super Admin, Read-Write All, Read-Only

Question 4

An Innovative model that classifies new forms of malware into known malware families based on code and behavioral similarity is called

Options:

A.

Sanitization (CDR)

B.

Polymorphic Model

C.

Behavior Guard

D.

Anti-Ransomware

Question 5

default, an FDE Action does what?

Options:

A.

Rebuilds the hard drive

B.

Decrypts all visible disk volumes

C.

Encrypts all visible disk volumes

D.

Re-defines all visible disk volumes

Question 6

What does the Endpoint Security Homepage offer useful resources for?

Options:

A.

Complicated Practices

B.

Best Practices

C.

Unix Client OS Support

D.

Quantum Management

Question 7

As an Endpoint Administrator you are facing with some errors related to AD Strong Authentication in Endpoint Management server. Where is the right place to look when you are troubleshooting these issues?

Options:

A.

$FWDIR/log/Authentication.log

B.

$FWDIR/logs/Auth.log

C.

$UEPMDIR/logs/Authentication.log

D.

$UEMPDlR/log/Authentication.elg

Question 8

When does the pre-boot logon require users to authenticate?

Options:

A.

Before password verification

B.

Before the computer's main operating system starts

C.

Before they enter their username

D.

Before the credentials are verified

Question 9

You must make a decision of which FDE algorithm to be used by one of your clients who specializes in multimedia video editing. What algorithm will you choose?

Options:

A.

The implementation of a Secure VPN with very strong encryption will make your data invisible in cases of live internet transmission.

B.

In Multimedia applications you do not need to implement any kind of Full disk encryption. You can use software like 7Zip in order to encrypt your data.

C.

Any kind of data is very important and the Full Disk Encryption technic must be used with the strongest secret key possible. Your client has to use strong encryption like XTS-AES 256 bit.

D.

Video processing is a high bandwidth application which utilizes a lot of HDD access time. You have to use a FDE algorithm with small secret key like XTS-AES 128 bit.

Question 10

With which release of Endpoint Client is the Anti-Malware engine based on Sophos instead to Kaspersky?

Options:

A.

Endpoint Client release E86.26 and higher for Cloud deployments

B.

Endpoint Client release E84.40 and higher for all deployments

C.

Endpoint Client release E83.20 and higher for Cloud deployments

D.

Endpoint Client release E81.20 and higher for On-premises deployments

Question 11

What GUI options do you have to access the Endpoint Security Management Server in a cloud environment?

Options:

A.

Infinity Portal and Web Management Console

B.

SmartConsoleandGaiaWebUI

C.

Nothing, there is no Cloud Support for Endpoint Management Server.

D.

SmartEndpoint Distributor

Question 12

How does FDE add another layer of security?

Options:

A.

By offering media encryption

B.

By offering pre-boot protection

C.

By offering port protection

D.

By offering encryption

Question 13

How many digits are required in the FDE policy settings to enable a Very High-Security level for remote help on pre-boot?

Options:

A.

40 digits

B.

Maximum 30 digits

C.

24 digits

D.

Minimum 20 digits

Question 14

If there are multiple EPS in an environment, what happens?

Options:

A.

One Endpoint client automatically communicates with the server

B.

Each Endpoint client automatically communicates with the EMS

C.

Each Endpoint client does an analysis to find which EPS is "closest" and automatically communicates with that server.

D.

Each Endpoint client automatically communicates with the SMS

Question 15

How can an administrator tell when the MAC OS Harmony Endpoint client is successfully installed?

Options:

A.

The Apple device will automatically reboot when the installation is complete. This is confirmation thatthe client is installed.

B.

The MAC OS will generate a pop-up message to notify the administrator.

C.

When the client is successfully installed, the Endpoint icon will app ear in the computer's menu bar.

D.

The Harmony management portal will generate a pop-up in the portal to notify theadministrator.

Question 16

What is the default encryption algorithm in Full Disk Encryption tab under Advanced Settings?

Options:

A.

AES-CBC 128 bit

B.

AES-CBC 256 bit

C.

XTS-AES 256 bit

D.

XTS-AES 128 bit

Question 17

In the OVERVIEW Tab of the Harmony Endpoint portal which Overview shows the Active Alerts?

Options:

A.

The Policy Overview

B.

The Computer Management view

C.

The Operational Overview

D.

The Security Overview

Question 18

What communication protocol does Harmony Endpoint management use to communicate with the management server?

Options:

A.

SIC

B.

CPCOM

C.

TCP

D.

UDP

Question 19

Which permissions apply the same access level to the entire organization?

Options:

A.

Organization-wide permission settings

B.

Regional user permission settings

C.

Universal user permission settings

D.

Global user permission settings

Question 20

On which search engines/web sites is the Safe Search feature supported in Harmony Endpoint?

Options:

A.

Google. Bing, Yahoo! by default, and extra support for Baidu, Yandex, Lycos and Excite if the Harmony Endpoint Management is deployed in Cloud

B.

Google, Bing, and Yahoo!

C.

Google and Bing if the Harmony Endpoint Management is On-Premises deployment

D.

Google, Yahoo! and OneSearch

Question 21

Which Endpoint capability ensures that protected computers comply with your organization's requirements and allows you to assign different security levels according to the compliance state of the endpoint computer

Options:

A.

Compliance Check

B.

Capsule Cloud Compliance

C.

Forensics and Anti-Ransomware

D.

Full Disk Encryption

Question 22

What does Endpoint's Media Encryption (ME) Software Capability requiring authorization accomplish?

Options:

A.

Protects sensitive data and encrypts storage media

B.

Controls ports and encrypts storage media

C.

Controls ports and manages ports

D.

Decrypts and blocks access to specific ports

Page: 1 / 8
Total 75 questions