Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Checkpoint 156-536 - Check Point Certified Harmony Endpoint Specialist - R81.20 (CCES)

Page: 3 / 3
Total 98 questions

Name one way to install Endpoint Security clients:

A.

Third-party deployment tools

B.

Automatic using the server deployment rules

C.

Package import

D.

Manual deployment using the internet

What does the Data Protection/General rule contain?

A.

Actions that define user authentication settings only

B.

Actions that define decryption settings for hard disks

C.

Actions that restore encryption settings for hard disks and change user authentication settings

D.

Actions that define port protection settings and encryption settings for hard disks and removable media

The Remote Help tool can be used to assist users in password recovery. What type of assistance does this tool provide?

A.

The Remote Help tool only provides procedural information and FAQs about the Endpoint Security Client, including the procedure to reset the password

B.

The Remote Help tool provides:

a) User Logon Pre-boot Remote Help

b) Media Encryption Remote Help

C.

The Remote Help tool provides:

a) Link to the secret location of an encrypted password file

b) Key to decrypt the password file

D.

The Remote Help tool unlocks admin accounts on SmartEndpoint

One of the ways to install Endpoint Security clients is ‘Automatic Deployment’. Which of this is true for automatic deployment of Endpoint Security clients?

A.

Automatic deployment can be done on any Windows machine with Check Point SmartConsole first installed

B.

Automatic deployment can be done on any Windows 10 machine without any Check Point component pre-installed

C.

For automatic deployment to work, the client system must have SVN Foundation enabled in Windows 10 or downloaded and installed on other operating systems

D.

Automatic deployment first requires installation of the Initial Client package, which is exported and distributed manually

Which of the following is not protected by the Full Disk Encryption (FDE) software?

    Client's user data

    Operating system files

    Temporary files

    Erased files

A.

Temporary and erased files

B.

All of these are protected with FDE

C.

Erased files

D.

Temporary files

Which command in a CLI session is used to check installed licenses on the Harmony Endpoint Management Server?

A.

cplic print -x

B.

show licenses all

C.

cplic add
D. cplic print +x

Which of the following is TRUE about the functions of Harmony Endpoint components?

A.

SmartEndpoint connects to the Check Point Security Management Server (SMS)

B.

SmartEndpoint Console connects to and manages the Endpoint Management Server (EMS)

C.

SmartConsole connects to and manages the Endpoint Management Server (EMS)

D.

Web Management Console for Endpoint connects to the Check Point Security Management Server (SMS)

Where are quarantined files stored?

A.

On client computer, under C:\ProgramData\CheckPoint\Endpoint Security\Remediation\quarantine

B.

On client computer, under C:\ProgramData\CheckPoint\Harmony Endpoint Security\quarantine

C.

On Management server, under $FWDIR\sba\Remediation\quarantine

D.

On client computer, under C:\Program Files\CheckPoint\Endpoint Security\Remediation\quarantine

What does pre-boot protection prevent?

A.

Unauthorized access to the Remote Help bypass tools or alternative boot technical support methods

B.

Unauthorized passwords or alternative "forgot passwords" methods during pre-boot

C.

Unauthorized users using post-boot methods

D.

Prevents unauthorized access to the operating system or bypass of boot protection