Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Checkpoint 156-536 - Check Point Certified Harmony Endpoint Specialist - R81.20 (CCES)

Page: 1 / 3
Total 98 questions

Before installing the Endpoint Security Management Server, it is necessary to consider this:

A.

A Network Security Management Server must be installed.

B.

A Network Security Management Server must NOT be installed on the same machine.

C.

An Endpoint Security Gateway must be installed.

D.

MS SQL Server must be available with full admin access.

What is the default encryption algorithm in the Full Disk Encryption tab under Advanced Settings?

A.

AES-CBC 128 bit

B.

AES-CBC 256 bit

C.

XTS-AES 256 bit

D.

XTS-AES 128 bit

Which command in CLI session is used to check status of Check Point processes on Harmony Endpoint Management server?

A.

cpwd_admin list

B.

ps -aux | grep EPM

C.

show mgmt server state

D.

cpwd state

When in the Strong Authentication workflow is the database installed on the secondary server?

A.

After Endpoint Security is enabled

B.

Before Endpoint Security is enabled

C.

Exactly when Endpoint Security is enabled

D.

After synchronization and before Endpoint Security has been enabled

What happens to clients that fail to meet the requirements?

A.

They have unenforced protections

B.

They have encryption issues

C.

They do not receive FDE protections

D.

They receive incomplete protections

What does Endpoint's Media Encryption (ME) Software Capability requiring authorization accomplish?

A.

Protects sensitive data and encrypts storage media

B.

Controls ports and encrypts storage media

C.

Controls ports and manages ports

D.

Decrypts and blocks access to specific ports

What does FDE software combine to authorize access to data on desktop computers and laptops?

A.

Post-logon authentication and encryption

B.

OS boot protection with pre-boot authentication and encryption

C.

OS boot protection and post-boot authentication

D.

Decryption

What capabilities does the Harmony Endpoint NGAV include?

A.

Anti-Ransomware, Anti-Exploit & Behavioral Guard

B.

Anti-IPS, Anti-Firewall & Anti-Guard

C.

Zero-Phishing, Anti-Bot & Anti-Virus

D.

Threat Extraction, Threat-Emulation & Zero-Phishing

The Harmony Endpoint solution includes which three Data Security Software Capability protections?

A.

• Full Disk Encryption

• Media Encryption

• Anti-Malware

B.

• Passwords and Usernames

• Port Protection (MEPP)

• Security Questions

C.

• Media Encryption

• Media Decryption

• Remote Access VPN

D.

• Full Disk Encryption

• Media Encryption & Port Protection (MEPP)

• Remote Access VPN

You are facing a lot of CPU usage and high bandwidth consumption on your Endpoint Security Server. You check and verify that everything is working as it should be, but the performance is still very slow. What can you do to decrease your bandwidth and CPU usage?

A.

The management High Availability sizing is not correct. You have to purchase more servers and add them to the cluster.

B.

Your company's size is not large enough to have a valid need for Endpoint Solution.

C.

Your company needs more bandwidth. You have to increase your bandwidth by 300%.

D.

You can use some of your Endpoints as Super Nodes since super nodes reduce bandwidth as well as CPU usage.