Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Checkpoint > CCES > 156-536

156-536 Check Point Certified Harmony Endpoint Specialist - R81.20 (CCES) Question and Answers

Question # 4

What type of attack is Ransomware?

A.

Where a victim encrypts files on a computer and demands payment for decryption key from an attacker.

B.

Where an attacker encrypts files on a computer and demands payment for decryption key.

C.

Ransomware is not an attack.

D.

Where an attacker decrypts files on a computer and demands payment for encryption key.

Full Access
Question # 5

One of the ways to install Endpoint Security clients is ‘Automatic Deployment’. Which of this is true for automatic deployment of Endpoint Security clients?

A.

Automatic deployment can be done on any Windows machine with Check Point SmartConsole first installed

B.

Automatic deployment can be done on any Windows 10 machine without any Check Point component pre-installed

C.

For automatic deployment to work, the client system must have SVN Foundation enabled in Windows 10 or downloaded and installed on other operating systems

D.

Automatic deployment first requires installation of the Initial Client package, which is exported and distributed manually

Full Access
Question # 6

What is the command required to be run to start the Endpoint Web Interface for on-premises Harmony Endpoint Web Interface access?

A.

start_web_mgmt - run in dish

B.

start_web_mgmt - run in expert mode

C.

web_mgmt_start - run in expert mode

D.

web_mgmt_start - run in dish

Full Access
Question # 7

What connection options does Connection Awareness support?

A.

There are two options: Connected and Disconnected

B.

Master and Slave Endpoint Security Management Server

C.

Client and Server model based on LDAP model. The supported ports are 389 and 636

D.

There are two options: Connected to Management and Connected to a List of Specified Targets

Full Access
Question # 8

Which User Roles are on the Endpoint Security Management Server for On-Premises servers?

A.

Primary Administrator and Read-Only

B.

Super Admin, Primary Administrator, User Admin, Read-Only

C.

Admin and Read-Only

D.

Super Admin, Read-Write All, Read-Only

Full Access
Question # 9

When can administrators prepare the client for the FDE software package installation and deployment?

A.

Once a client meets the maximum system requirements

B.

Once the policy is installed

C.

Once the client system volumes have 32 MB of space

D.

Once a client machine meets the minimum system requirements

Full Access
Question # 10

When in the Strong Authentication workflow is the database installed on the secondary server?

A.

After Endpoint Security is enabled

B.

Before Endpoint Security is enabled

C.

Exactly when Endpoint Security is enabled

D.

After synchronization and before Endpoint Security has been enabled

Full Access
Question # 11

For most tasks, Endpoint clients communicate with the [X] and the [X] communicates with the EMS?

Options:

A.

SMS

B.

EPS

C.

NMS

D.

Management Server

Full Access
Question # 12

In a Standalone installation, the EMS is installed on the same computer or a different one than the NMS?

A.

Same

B.

Half on one and half on another computer

C.

Both

D.

Different

Full Access
Question # 13

Which information can we find on the Operational Overview dashboard?

A.

Active Attacks, Deployment status, Pre-boot status, Anti-Malware update, Harmony Endpoint Version, and Operating system

B.

Active Endpoints, Active Alerts, Deployment status, Pre-boot status, Encryption Status

C.

Hosts under Attack, Active Attacks, Blocked Attacks

D.

Desktops, Servers, Active Alerts, Anti-Malware update, Harmony Endpoint Version

Full Access
Question # 14

How does Full Disk Encryption (FDE) add another layer of security?

A.

By offering media encryption

B.

By offering pre-boot protection

C.

By offering port protection

D.

By offering encryption

Full Access
Question # 15

What blades have to be enabled on the Management Server for the Endpoint Security Management Server to operate?

A.

You can enable all gateway-related blades

B.

The administrator has to enable Compliance and Network Policy Management

C.

Logging & Status, SmartEvent Server, and SmartEvent Correlation unit must be enabled

D.

The SmartEndpoint super Node on the Management

Full Access
Question # 16

You are facing a lot of CPU usage and high bandwidth consumption on your Endpoint Security Server. You check and verify that everything is working as it should be, but the performance is still very slow. What can you do to decrease your bandwidth and CPU usage?

A.

The management High Availability sizing is not correct. You have to purchase more servers and add them to the cluster.

B.

Your company's size is not large enough to have a valid need for Endpoint Solution.

C.

Your company needs more bandwidth. You have to increase your bandwidth by 300%.

D.

You can use some of your Endpoints as Super Nodes since super nodes reduce bandwidth as well as CPU usage.

Full Access
Question # 17

Which command in CLI session is used to check status of Check Point processes on Harmony Endpoint Management server?

A.

cpwd_admin list

B.

ps -aux | grep EPM

C.

show mgmt server state

D.

cpwd state

Full Access
Question # 18

When does the pre-boot logon require users to authenticate?

A.

Before password verification

B.

Before the computer's main operating system starts

C.

Before they enter their username

D.

Before the credentials are verified

Full Access
Question # 19

External Policy Servers are placed between the Endpoint clients and the Endpoint Security Management Server. How many Policy Servers are supported per environment?

A.

From 1 to 25 Policy Servers are supported

B.

From 1 to 15 Policy Servers are supported

C.

From 1 to 20 Policy Servers are supported

D.

From 1 to 5 Policy Servers are supported

Full Access
Question # 20

When deploying a policy server, which is important?

A.

To have policies in place

B.

To configure the heartbeat interval and define the amount of time that the client is allowed to connect to the server

C.

To configure the EPS and define the amount of time that the client is allowed to connect to the SMS

D.

To install the heartbeat server first

Full Access
Question # 21

External Endpoint Policy Servers (EPS) decrease X and reduce X between sites?

A.

Decrease policies and reduce traffic between sites

B.

Decrease power and reduce accidents between sites

C.

Decrease clients and reduce device agents between sites

D.

External Endpoint Policy Servers (EPS) decrease the load of the EMS and reduce the bandwidth required between sites

Full Access
Question # 22

What does pre-boot protection prevent?

A.

Unauthorized access to the Remote Help bypass tools or alternative boot technical support methods

B.

Unauthorized passwords or alternative "forgot passwords" methods during pre-boot

C.

Unauthorized users using post-boot methods

D.

Prevents unauthorized access to the operating system or bypass of boot protection

Full Access
Question # 23

The CISO office evaluates Check Point Harmony Endpoint and needs to know what kind of post-infection capabilities exist. Which post-infection capabilities does the Harmony Endpoint Suite include?

A.

IPS Attack Analysis (Forensics), Deploy and Destroy, and Isolation

B.

Automated Attack Analysis (Forensics), Remediation and Response, and Quarantine

C.

FW Attack Analysis (Forensics), Detect and Prevent, and Isolation

D.

IPS Attack Analysis (Forensics), Detect and Prevent, and Isolation

Full Access
Question # 24

As an Endpoint Administrator, you are facing some errors related to AD Strong Authentication in the Endpoint Management Server. Where is the right place to look when you are troubleshooting these issues?

A.

$FWDIR/log/Authentication.log

B.

$FWDIR/logs/Auth.log

C.

$UEPMDIR/logs/Authentication.log

D.

$UEMPDlR/log/Authentication.elg

Full Access
Question # 25

What does the Data Protection/General rule contain?

A.

Actions that define user authentication settings only

B.

Actions that define decryption settings for hard disks

C.

Actions that restore encryption settings for hard disks and change user authentication settings

D.

Actions that define port protection settings and encryption settings for hard disks and removable media

Full Access
Question # 26

In the OVERVIEW Tab of the Harmony Endpoint portal, which Overview shows the Active Alerts?

A.

The Policy Overview

B.

The Computer Management view

C.

The Operational Overview

D.

The Security Overview

Full Access
Question # 27

The Push Operation Wizard allows users to select which three topics for Push Operations?

A.

Anti-Malware, Forensics and Remediation, Agent Settings

B.

Anti-Virus, Remediation, Agent Settings

C.

Anti-Malware, Analysis, Agent Deployment

D.

Anti-Ransomware, Forensics and Analysis, Agent Configurations

Full Access
Question # 28

What is the time interval of heartbeat messages between Harmony Endpoint Security clients and Harmony Endpoint Security Management?

A.

60 milli-seconds

B.

60 minutes

C.

60 seconds

D.

30 seconds

Full Access
Question # 29

On which desktop operating systems are Harmony Endpoint Clients supported?

A.

Windows, macOS, Linux and Unix

B.

Only Windows and macOS

C.

Windows Servers and Clients, macOS and Linux

D.

Windows Client, macOS and Linux

Full Access