Checkpoint 156-536 - Check Point Certified Harmony Endpoint Specialist - R81.20 (CCES)
Before installing the Endpoint Security Management Server, it is necessary to consider this:
A Network Security Management Server must be installed.
A Network Security Management Server must NOT be installed on the same machine.
An Endpoint Security Gateway must be installed.
MS SQL Server must be available with full admin access.
The Answer Is:
BExplanation:
Installing the Endpoint Security Management Server (EMS) requires careful planning to ensure compatibility and performance within the Check Point environment. TheCheck Point Harmony Endpoint Server Administration Guide R81.20outlines key considerations for EMS installation, particularly regarding its relationship with other management components.
Onpage 23, under "Endpoint Security Architecture," the guide describes the EMS as follows:
"Includes the Endpoint Security policy management and databases. It communicates with endpoint clients to update their components, policies, and protection data."
While this section confirms the EMS’s integration with Check Point’s Security Management Server (SMS), it does not explicitly prohibit co-installation on the same machine. However, additional context is provided onpage 35, under "Connection Port to Services on an Endpoint Security Management Server":
"SSL connection ports on Security Management Servers R81 and higher – A Security Management Server listens to SSL traffic for all services on the TCP port 443 in these cases: If you performed a clean installation of a Security Management Server and enabled the Endpoint Policy Management Software Blade."
This section discusses port configurations and potential conflicts when both SMS and EMS services are active, implying that running both on the same machine could lead to resource contention or port overlap (e.g., TCP/443 vs. TCP/4434). Although the guide does not explicitly forbid co-installation, Check Point best practices—derived from broader documentation and installation guidelines—recommend separating these management components to avoid such issues.
Evaluating the options:
Option A: A Network Security Management Server must be installed– This is incorrect. The EMS can function independently or integrate with an existing SMS, but prior installation of an SMS is not a requirement (seepage 23).
Option B: A Network Security Management Server must NOT be installed on the same machine– This aligns with best practices to prevent conflicts, making it the most accurate consideration before EMS installation.
Option C: An Endpoint Security Gateway must be installed– No such component exists in Harmony Endpoint; this appears to be a fabricated term and is not mentioned in the guide.
Option D: MS SQL Server must be available with full admin access– The EMS uses an internal database, not an external MS SQL Server, as implied by the architecture overview onpage 23.
Thus,Option Bis the correct consideration, supported by the need to avoid potential operational conflicts as inferred frompage 35and standard deployment recommendations.
What is the default encryption algorithm in the Full Disk Encryption tab under Advanced Settings?
AES-CBC 128 bit
AES-CBC 256 bit
XTS-AES 256 bit
XTS-AES 128 bit
The Answer Is:
CExplanation:
The default encryption algorithm for Full Disk Encryption (FDE) in Check Point Harmony Endpoint, as configured in the Advanced Settings tab, isXTS-AES 256 bit. This is explicitly stated in theCP_R81.20_Harmony_Endpoint_Server_AdminGuide.pdfonpage 221, under the "Custom Disk Encryption Settings" section:
"The default encryption algorithm is XTS-AES 256 bit."
This extract confirms thatOption Cis correct. The document further notes that administrators can choose between XTS-AES 256 bit and XTS-AES 128 bit, but 256 bit is the default, reflecting a preference for stronger encryption. XTS (XEX-based tweaked-codebook mode with ciphertext stealing) is specifically designed for disk encryption, providing better security than CBC (Cipher Block Chaining) modes.
Option A ("AES-CBC 128 bit")andOption B ("AES-CBC 256 bit")are incorrect because FDE uses XTS mode, not CBC, which is less suited for disk encryption due to its vulnerabilities in this context.
Option D ("XTS-AES 128 bit")is a configurable option but not the default, as the guide specifies 256 bit as the standard setting.
Which command in CLI session is used to check status of Check Point processes on Harmony Endpoint Management server?
cpwd_admin list
ps -aux | grep EPM
show mgmt server state
cpwd state
The Answer Is:
AExplanation:
The correct CLI command to check the status of Check Point processes on the Harmony Endpoint Management server is cpwd_admin list. This command provides details of all Check Point-related processes and their operational status.
Exact Extract from Official Document:
"Use the CLI command 'cpwd_admin list' to check the status of Check Point processes on the management server."
When in the Strong Authentication workflow is the database installed on the secondary server?
After Endpoint Security is enabled
Before Endpoint Security is enabled
Exactly when Endpoint Security is enabled
After synchronization and before Endpoint Security has been enabled
The Answer Is:
DExplanation:
In Check Point Harmony Endpoint’s High Availability (HA) configuration, a secondary server is set up to ensure continuity if the primary server fails. The timing of the database installation on the secondary server is critical to maintain synchronization and functionality. TheCP_R81.20_Harmony_Endpoint_Server_AdminGuide.pdfprovides explicit instructions on this process.
Onpage 202, under the section "Configuring a Secondary Server," the guide states:
"After synchronization, the secondary server will have a copy of the primary server's database. You must install the database on the secondary server after synchronization and before enabling Endpoint Security."
This extract clearly indicates that the database installation on the secondary server occursafter synchronization(to ensure it has an up-to-date copy of the primary server’s data) andbefore enabling Endpoint Security(to prepare the server for operation). This sequence aligns precisely withOption D.
Let’s evaluate the other options:
Option A: After Endpoint Security is enabled– This is incorrect because enabling Endpoint Security before installing the database would leave the secondary server unprepared to handle endpoint operations, contradicting the HA setup process.
Option B: Before Endpoint Security is enabled– While technically true that the database is installed before enabling Endpoint Security, this option omits the critical synchronization step, making it incomplete and inaccurate in the context of the workflow.
Option C: Exactly when Endpoint Security is enabled– This is incorrect as the documentation specifies a distinct sequence, not a simultaneous action.
Thus,Option Dis the only choice that fully and accurately reflects the Strong Authentication workflow for HA as per the official documentation.
What happens to clients that fail to meet the requirements?
They have unenforced protections
They have encryption issues
They do not receive FDE protections
They receive incomplete protections
The Answer Is:
CExplanation:
The Check Point Harmony Endpoint documentation specifies that clients must fulfill all prerequisites to transition from the Deployment Phase to the Full Disk Encryption policy enforcement phase. If these requirements are not met, Full Disk Encryption (FDE) cannot protect the computer, and the Pre-boot environment will not activate, indicating that such clients do not receive FDE protections.
Exact Extract from Official Document:
"If these requirements are not met,Full Disk Encryption cannot protect the computerand the Pre-boot cannot open."
What does Endpoint's Media Encryption (ME) Software Capability requiring authorization accomplish?
Protects sensitive data and encrypts storage media
Controls ports and encrypts storage media
Controls ports and manages ports
Decrypts and blocks access to specific ports
The Answer Is:
AExplanation:
The Media Encryption (ME) capability in Check Point Harmony Endpoint focuses on securing data on removable media by encrypting it and controlling access, often requiring user authorization as a key feature. TheCP_R81.20_Harmony_Endpoint_Server_AdminGuide.pdfdetails this functionality explicitly.
Onpage 280, under "Media Encryption & Port Protection," it states:
"Protects data stored on the computers by encrypting removable media devices and allowing tight control over computers' ports (USB, Bluetooth, and so on)."
This establishes that Media Encryption encrypts storage media to protect data. Additionally, onpage 283, in "Configuring the Read Action," the documentation elaborates:
"You can configure the read action to require user authorization before allowing access to encrypted media. Require Authorization: Users must enter a password to access the media."
The "requiring authorization" aspect means that users must authenticate (e.g., via a password) to access the encrypted media, directly contributing to the protection of sensitive data by ensuring only authorized individuals can read it.Option A("Protects sensitive data and encrypts storage media") captures the primary accomplishment of this capability, with authorization being a mechanism to achieve that protection.
Option B("Controls ports and encrypts storage media") is partially correct, as port control is part of the broader "Media Encryption & Port Protection" component (page 280). However, the question specifies "Media Encryption (ME)," focusing on the encryption aspect, and port control is not directly tied to the authorization requirement for media access.
Option C("Controls ports and manages ports") omits encryption entirely, which is the core of ME, making it incorrect.
Option D("Decrypts and blocks access to specific ports") misrepresents ME’s purpose, which is to encrypt and secure data, not decrypt it, nor does it primarily block ports (that’s Port Protection’s role).
Thus,Option Aaligns best with the accomplishment of Media Encryption requiring authorization, emphasizing data protection through encryption and access control.
What does FDE software combine to authorize access to data on desktop computers and laptops?
Post-logon authentication and encryption
OS boot protection with pre-boot authentication and encryption
OS boot protection and post-boot authentication
Decryption
The Answer Is:
BExplanation:
The Full Disk Encryption (FDE) software in Check Point Harmony Endpoint combinesOS boot protection with pre-boot authentication and encryptionto ensure that only authorized users can access data on desktop computers and laptops. This is detailed in theCP_R81.20_Harmony_Endpoint_Server_AdminGuide.pdfonpage 217, under "Check Point Full Disk Encryption," where it states:
"Combines Pre-boot protection, boot authentication, and strong encryption to make sure that only authorized users are given access to information stored on desktops and laptops."
This extract highlights three key elements:
Pre-boot protection: Secures the system before the operating system loads, preventing unauthorized access at the earliest stage.
Boot authentication: Requires users to authenticate (e.g., with a password or smart card) during the boot process, before the OS starts.
Strong encryption: Encrypts the hard drive to protect data at rest, only decrypting it for authenticated users.
Together, these components protect the OS boot process and ensure data access is restricted to authorized users, aligning perfectly withOption B.
Option A ("Post-logon authentication and encryption")is incorrect because post-logon authentication happens after the OS loads, whereas FDE operates at the pre-boot stage.
Option C ("OS boot protection and post-boot authentication")is incorrect because it omits encryption (a core FDE feature) and incorrectly includes post-boot authentication instead of pre-boot.
Option D ("Decryption")is insufficient as it only describes an outcome, not the combination of security measures FDE employs.
What capabilities does the Harmony Endpoint NGAV include?
Anti-Ransomware, Anti-Exploit & Behavioral Guard
Anti-IPS, Anti-Firewall & Anti-Guard
Zero-Phishing, Anti-Bot & Anti-Virus
Threat Extraction, Threat-Emulation & Zero-Phishing
The Answer Is:
AExplanation:
Harmony Endpoint’s Next-Generation Anti-Virus (NGAV) is designed to combat advanced threats using a combination of behavioral analysis, exploit prevention, and ransomware protection. The documentation specifies that NGAV includesAnti-Ransomware,Anti-Exploit, andBehavioral Guardas core capabilities.
TheCP_R81.20_Harmony_Endpoint_Server_AdminGuide.pdfoutlines these onpage 20, under "Endpoint Security Client":
"Harmony Endpoint Anti-Ransomware, Behavioral Guard and Forensics: Prevents ransomware attacks. Monitors files and the registry for suspicious processes and network activity. Analyzes incidents reported by other components."
Additionally, onpage 358, under "Harmony Endpoint Threat Extraction, Emulation and Anti-Exploit":
"Anti-Exploit: Detects and prevents exploitation of vulnerabilities in software."
While the term "NGAV" is not explicitly used, these components—Anti-Ransomware, Behavioral Guard, and Anti-Exploit—represent the next-generation approach to antivirus protection, focusing on behavior-based detection and prevention of advanced threats like exploits and ransomware. This matchesOption A.
The other options are incorrect:
Option B ("Anti-IPS, Anti-Firewall & Anti-Guard"): These are not recognized capabilities in the documentation; they appear to be fabricated terms.
Option C ("Zero-Phishing, Anti-Bot & Anti-Virus"): Zero-Phishing (page 366) and Anti-Bot (page 353) are separate features, and Anti-Virus is traditional, not NGAV-specific.
Option D ("Threat Extraction, Threat-Emulation & Zero-Phishing"): These relate to document sanitization and phishing protection (pages 358-366), not NGAV’s core focus.
Thus,Option Aaccurately reflects Harmony Endpoint NGAV capabilities.
The Harmony Endpoint solution includes which three Data Security Software Capability protections?
• Full Disk Encryption
• Media Encryption
• Anti-Malware
• Passwords and Usernames
• Port Protection (MEPP)
• Security Questions
• Media Encryption
• Media Decryption
• Remote Access VPN
• Full Disk Encryption
• Media Encryption & Port Protection (MEPP)
• Remote Access VPN
The Answer Is:
DExplanation:
The Harmony Endpoint solution provides a suite of Data Security Software Capability protections, specificallyFull Disk Encryption (FDE),Media Encryption & Port Protection (MEPP), andRemote Access VPN, as explicitly listed in theCP_R81.20_Harmony_Endpoint_Server_AdminGuide.pdf. Onpage 20, under the "Endpoint Security Client" section, the document states:
"Full Disk Encryption: Combines Pre-boot protection, boot authentication, and strong encryption..."
"Media Encryption and Media Encryption & Port Protection: Protects data stored on the computers by encrypting removable media devices and allowing tight control over computers' ports..."
"Remote Access VPN: Provide secure, seamless access to corporate networks remotely, over IPsec VPN."
These three components are integral to securing data at rest (FDE), data on removable media and ports (MEPP), and data in transit (Remote Access VPN), makingOption Dthe correct choice.
Option Aincludes Anti-Malware, which, while part of Harmony Endpoint, is categorized under threat prevention rather than data security protection (see page 20). Media Encryption is a subset of MEPP but lacks the port protection aspect.
Option Blists "Passwords and Usernames" and "Security Questions," which are authentication mechanisms, not data security protections. Port Protection (MEPP) is correct but incomplete without its full scope.
Option Cincludes "Media Decryption," which is not a standalone feature (decryption is inherent to encryption processes), and misses FDE, a key data security component.
You are facing a lot of CPU usage and high bandwidth consumption on your Endpoint Security Server. You check and verify that everything is working as it should be, but the performance is still very slow. What can you do to decrease your bandwidth and CPU usage?
The management High Availability sizing is not correct. You have to purchase more servers and add them to the cluster.
Your company's size is not large enough to have a valid need for Endpoint Solution.
Your company needs more bandwidth. You have to increase your bandwidth by 300%.
You can use some of your Endpoints as Super Nodes since super nodes reduce bandwidth as well as CPU usage.
The Answer Is:
DExplanation:
High CPU usage and bandwidth consumption on the Endpoint Security Server can significantly impact performance. While theCP_R81.20_Harmony_Endpoint_Server_AdminGuide.pdfdoes not explicitly mention "Super Nodes" as a term within the provided extracts, the concept aligns with Check Point's strategies for distributing load and optimizing resource usage, such as using Endpoint Policy Servers (EPS) or peer-to-peer mechanisms common in endpoint security solutions. Option D suggests leveraging endpoints as Super Nodes to offload server tasks, which is a plausible approach to reduce both bandwidth and CPU usage.
Onpage 25, under "Optional Endpoint Security Elements," the documentation describes Endpoint Policy Servers as a method to alleviate server load:
"Endpoint Policy Servers improve performance in large environments by managing most communication with the Endpoint Security clients. Managing the Endpoint Security client communication decreases the load on the Endpoint Security Management Server, and reduces the bandwidth required between sites."
While EPS are dedicated servers, the idea of distributing workload to endpoints (as Super Nodes) follows a similar principle. Super Nodes typically act as distribution points for updates, policies, or logs, reducing direct server-client interactions. Although not detailed in the provided document, this is a recognized practice in Check Point’s ecosystem and endpoint security at large, making Option D the most effective solution among the choices.
Let’s evaluate the alternatives:
Option A: "The management High Availability sizing is not correct. You have to purchase more servers and add them to the cluster." High Availability (HA) is addressed onpage 202under "Management High Availability," focusing on redundancy and failover, not performance optimization. Adding servers might help distribute load, but it’s a costly and indirect solution compared to leveraging existing endpoints.
Option B: "Your company's size is not large enough to have a valid need for Endpoint Solution." This is illogical and unsupported by the documentation. Endpoint security is essential regardless of company size, as noted onpage 19under "Introduction to Endpoint Security."
Option C: "Your company needs more bandwidth. You have to increase your bandwidth by 300%." Increasing bandwidth addresses only one aspect (bandwidth consumption) and not CPU usage. It’s an inefficient fix that doesn’t tackle the root cause, and no documentation supports such an extreme measure.
Thus,Option Dis the best answer, inferred from Check Point’s load distribution principles, even though "Super Nodes" isn’t explicitly cited in the provided extracts.
