Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Checkpoint 156-536 Check Point Certified Harmony Endpoint Specialist - R81.20 (CCES) Exam Practice Test

Demo: 29 questions
Total 98 questions

Check Point Certified Harmony Endpoint Specialist - R81.20 (CCES) Questions and Answers

Question 1

As an Endpoint Administrator, you are facing some errors related to AD Strong Authentication in the Endpoint Management Server. Where is the right place to look when you are troubleshooting these issues?

Options:

A.

$FWDIR/log/Authentication.log

B.

$FWDIR/logs/Auth.log

C.

$UEPMDIR/logs/Authentication.log

D.

$UEMPDlR/log/Authentication.elg

Question 2

Where are the Endpoint Policy Servers located?

Options:

A.

Between the Endpoint clients and the EPS

B.

Between the Endpoint clients and the EMS

C.

Between the Endpoint clients and the NMS

D.

Between the Endpoint clients and the SMS

Question 3

What communication protocol does Harmony Endpoint management use to communicate with the management server?

Options:

A.

SIC

B.

CPCOM

C.

TCP

D.

UDP

Question 4

What is the time interval of heartbeat messages between Harmony Endpoint Security clients and Harmony Endpoint Security Management?

Options:

A.

60 milli-seconds

B.

60 minutes

C.

60 seconds

D.

30 seconds

Question 5

Which information can we find on the Operational Overview dashboard?

Options:

A.

Active Attacks, Deployment status, Pre-boot status, Anti-Malware update, Harmony Endpoint Version, and Operating system

B.

Active Endpoints, Active Alerts, Deployment status, Pre-boot status, Encryption Status

C.

Hosts under Attack, Active Attacks, Blocked Attacks

D.

Desktops, Servers, Active Alerts, Anti-Malware update, Harmony Endpoint Version

Question 6

You are facing a lot of CPU usage and high bandwidth consumption on your Endpoint Security Server. You check and verify that everything is working as it should be, but the performance is still very slow. What can you do to decrease your bandwidth and CPU usage?

Options:

A.

The management High Availability sizing is not correct. You have to purchase more servers and add them to the cluster.

B.

Your company's size is not large enough to have a valid need for Endpoint Solution.

C.

Your company needs more bandwidth. You have to increase your bandwidth by 300%.

D.

You can use some of your Endpoints as Super Nodes since super nodes reduce bandwidth as well as CPU usage.

Question 7

Endpoint’s Media Encryption (ME) Software Capability protects sensitive data on what, and how?

Options:

A.

Storage devices, removable media, and other input/output devices by requiring authorization before a user accesses the device

B.

Input/output devices using Anti-Malware

C.

Removable media and other input/output devices by using encryption methods

D.

Storage devices by requiring multi-factor authorization

Question 8

What GUI options do you have to access the Endpoint Security Management Server in a cloud environment?

Options:

A.

Infinity Portal and Web Management Console

B.

SmartConsole and Gaia WebUI

C.

Nothing, there is no Cloud Support for Endpoint Management Server.

D.

SmartEndpoint Distributor

Question 9

When does the pre-boot logon require users to authenticate?

Options:

A.

Before password verification

B.

Before the computer's main operating system starts

C.

Before they enter their username

D.

Before the credentials are verified

Question 10

What does pre-boot protection require of users?

Options:

A.

To authenticate before the computer will start

B.

To answer a security question after login

C.

To authenticate before the computer's OS starts

D.

To regularly change passwords

Question 11

How is the Kerberos keytab file created?

Options:

A.

Using Kerberos principals

B.

Using the AD server

C.

Using encryption keys

D.

With the ktpass tool

Question 12

How many digits are required in the FDE policy settings to enable a Very High-Security level for remote help on pre-boot?

Options:

A.

40 digits

B.

Maximum 30 digits

C.

24 digits

D.

Minimum 20 digits

Question 13

What does Port Protection protect, and why?

Options:

A.

Activity on the ports of a client computer to help prevent data leakage

B.

Activity on the ports of a client computer to review logs

C.

Activity on the ports of a client computer to help unauthorized user access

D.

Activity on the ports of a client computer to monitor devices

Question 14

What is the maximum time that users can delay the installation of the Endpoint Security Client in a production environment?

Options:

A.

2 Hours

B.

30 minutes

C.

48 Hours

D.

8 Hours

Question 15

External Endpoint Policy Servers (EPS) decrease X and reduce X between sites?

Options:

A.

Decrease policies and reduce traffic between sites

B.

Decrease power and reduce accidents between sites

C.

Decrease clients and reduce device agents between sites

D.

External Endpoint Policy Servers (EPS) decrease the load of the EMS and reduce the bandwidth required between sites

Question 16

Harmony Endpoint’s Full Disk Encryption (FDE) only allows access to authorized users using what?

Options:

A.

Multifaceted pre-boot capabilities

B.

Strong Passwords

C.

Single login

D.

Username verification

Question 17

One of the ways to install Endpoint Security clients is ‘Automatic Deployment’. Which of this is true for automatic deployment of Endpoint Security clients?

Options:

A.

Automatic deployment can be done on any Windows machine with Check Point SmartConsole first installed

B.

Automatic deployment can be done on any Windows 10 machine without any Check Point component pre-installed

C.

For automatic deployment to work, the client system must have SVN Foundation enabled in Windows 10 or downloaded and installed on other operating systems

D.

Automatic deployment first requires installation of the Initial Client package, which is exported and distributed manually

Question 18

What are the benefits of the Check Point Consolidated Cyber Security Architecture?

Options:

A.

Consolidated network functions

B.

Single policy

C.

Decentralized management

D.

Consolidated security functions

Question 19

The Check Point Harmony Product Suite is a suite of security products that includes?

Options:

A.

Quantum Spark

B.

Harmony Mobile (On-Premises)

C.

Quantum Endpoint (Cloud)

D.

Harmony Endpoint (Cloud and On-Premises)

Question 20

What does Endpoint's Media Encryption (ME) Software Capability requiring authorization accomplish?

Options:

A.

Protects sensitive data and encrypts storage media

B.

Controls ports and encrypts storage media

C.

Controls ports and manages ports

D.

Decrypts and blocks access to specific ports

Question 21

Name one way to install Endpoint Security clients:

Options:

A.

Third-party deployment tools

B.

Automatic using the server deployment rules

C.

Package import

D.

Manual deployment using the internet

Question 22

What does FDE software combine to authorize access to data on desktop computers and laptops?

Options:

A.

Post-logon authentication and encryption

B.

OS boot protection with pre-boot authentication and encryption

C.

OS boot protection and post-boot authentication

D.

Decryption

Question 23

Which command in a CLI session is used to check installed licenses on the Harmony Endpoint Management Server?

Options:

A.

cplic print -x

B.

show licenses all

C.

cplic add
D. cplic print +x

Question 24

How many security levels can you set when enabling Remote Help on pre-boot?

Options:

A.

Four levels - Low security, Medium security, High security, Very High security

B.

Two levels - Low and High security

C.

Three levels - Low security, Medium security, High security

D.

One and only level - enable or disable security

Question 25

What does the Kerberos keytab file contain?

Options:

A.

Pairs of authentication settings and un-authentication settings

B.

Pairs of encryption and decryption keys

C.

Pairs of Kerberos principals and encryption keys

D.

Pairs of ktpass tools

Question 26

What does the Check Point Support Center as your one-stop portal offer?

Options:

A.

UserMates offline discussion boards

B.

Technical Certification

C.

SecureKnowledge technical database

D.

Offloads

Question 27

Why is it critical to change the default Agent Uninstall Password?

Options:

A.

All passwords and critical data are protected by Full Disk Encryption. The Endpoint agent supports pre-boot authentication so nobody can bypass the agent’s security.

B.

There is no need to change it because only the local PC administrator can uninstall the agent.

C.

The default password used is easy to guess.

D.

You have to change the default Agent Uninstall Password because if you do not, it will be easy for a malware to uninstall the agent itself.

Question 28

Harmony Endpoint offers Endpoint Security Client packages for which operating systems?

Options:

A.

Unix, WinLinux and macOS

B.

Windows, macOS and Linux operating systems

C.

macOS, iPadOS and Windows

D.

Windows, AppleOS and Unix operating systems

Question 29

"Heartbeat" refers to what?

Options:

A.

A periodic client connection to the server

B.

A client connection that happens every 60 seconds

C.

A server connection that happens every 5 minutes

D.

A random server connection

Demo: 29 questions
Total 98 questions