What communication protocol does Harmony Endpoint management use to communicate with the management server?
- A . SIC
- B . CPCOM
- C . TCP
- D . UDP
"Heartbeat" refers to what?
- A . A periodic client connection to the server
- B . A client connection that happens every 60 seconds
- C . A server connection that happens every 5 minutes
- D . A random server connection
What are the benefits of the Check Point Consolidated Cyber Security Architecture?
- A . Consolidated network functions
- B . Single policy
- C . decentralized management
- D . Consolidated security functions
What is the time interval of heartbeat messages between Harmony Endpoint Security clients and Harmony Endpoint Security Management?
- A . 60 milli-seconds
- B . 60 minutes
- C . 60 seconds
- D . 30 seconds
Which of the following is TRUE about the functions of Harmony Endpoint components
- A . SmartEndpoint connects to the Check Point Security Management Server (SMS)
- B . SmartEndpoint Console connects to and manages the Endpoint Management Server (EMS)
- C . SmartConsole connects to and manages the Endpoint Management Server (EMS)
- D . Web Management Console for Endpoint connects to the Check Point Security Management Server (SMS)
What GUI options do you have to access the Endpoint Security Management Server in a cloud environment?
- A . Infinity Portal and Web Management Console
- B . SmartConsoleandGaiaWebUI
- C . Nothing, there is no Cloud Support for Endpoint Management Server.
- D . SmartEndpoint Distributor
What does the Endpoint Security Homepage offer useful resources for?
- A . Complicated Practices
- B . Best Practices
- C . Unix Client OS Support
- D . Quantum Management
On which search engines/web sites is the Safe Search feature supported in Harmony Endpoint?
- A . Google. Bing, Yahoo! by default, and extra support for Baidu, Yandex, Lycos and Excite if the Harmony Endpoint Management is deployed in Cloud
- B . Google, Bing, and Yahoo!
- C . Google and Bing if the Harmony Endpoint Management is On-Premises deployment
- D . Google, Yahoo! and OneSearch
What is default Agent Uninstall Password, which protect client from unauthorized removal?
- A . Secret
- B . Chkp1234
- C . secret
- D . RemoveMe
With which release of Endpoint Client is the Anti-Malware engine based on Sophos instead to Kaspersky?
- A . Endpoint Client release E86.26 and higher for Cloud deployments
- B . Endpoint Client release E84.40 and higher for all deployments
- C . Endpoint Client release E83.20 and higher for Cloud deployments
- D . Endpoint Client release E81.20 and higher for On-premises deployments
What does the Check Point Support Center as your one-stop portal offer?
- A . UserMates offline discussion boards
- B . Technical Certification
- C . SecureKnowledge technical database
- D . Offloads
What is the maximum time, that users can delay the installation of the Endpoint Security Client in a production environment?
- A . 2 Hours
- B . 30 minutes
- C . 48 Hours
- D . 8 Hours
What is the command required to be run to start the Endpoint Web Interface for on-premises Harmony Endpoint Web Interface access?
- A . start_web_mgmt – run in dish
- B . start_web_mgmt – run in expert mode
- C . web_mgmt_start – run in expert mode
- D . web_mgmt_start – run in dish
What are the General components of Data Protection?
- A . Data protection includes VPN. and Firewall capabilities.
- B . Full Disk Encryption (FDE). Media Encryption and Port Protection.
- C . it supports SmartCard Authentication and Pre-Boot encryption.
- D . Only OneCheck in Pre-Boot environment.
Where are quarantined files stored?
- A . On client computer, under C:ProgramDataCheckPointEndpoint SecurityRemediationquarantlne
- B . On client computer, under C:ProgramDataCheckPointHarmony Endpoint Securityquarantine
- C . On Management server, under $FWDIRsbaRemediationquarantine
- D . On client computer, under C:Program FilesCheckPointEndpoint SecurityRemedlaiionquarantine
What connect options does the connection Awareness support?
- A . There are two options: Connected and Disconnected
- B . Master and Slave Endpoint Security Management Server.
- C . Client and Server model based on Idap model. The supported ports are 389 and 636.
- D . There are two options: Connected to Management and Connected to a List of Specified Targets.
Which information can we find on the Operational Overview dashboard?
- A . Active Attacks. Deployment status. Pre-boot status, Anti-Malware update. Harmony Endpoint Version and Operating system
- B . Active Endpoints. Active Alerts, Deployment status, Pre-boot status, Encryption Status
- C . Hosts under Attack, Active Attacks, Blocked Attacks
- D . Desktops. Servers, Active Alerts, Anti-Malware update, Harmony Endpoint Version
Which command in CLI session is used to check installed licenses on Harmony Endpoint Management server?
- A . cplic print-x
- B . show licenses all
- C . cplic add <license filename>
- D . cplic print +x
What blades have to be enabled on the Management Server in order for the Endpoint Security Management Server to operate?
- A . You can enable all gateway related blades.
- B . The administrator has to enable compliance and Network Policy Management.
- C . Logging & Status, SmartEvent Server, and SmartEvent Correlation unit must be enabled.
- D . The SmartEndPoint super Node on the Management.
When you are facing a technical problem and you need help, what resource is recommended for all technical information about Check Point products?
- A . You can use an online search engine like Google and you will find the answer in the first results.
- B . Check Point SecureKnowledge, CheckMates and Check Point Customer Support.
- C . You ca use any infosec related online sources.
- D . Press F1 in the SmartConsole and write down the problem.
In the OVERVIEW Tab of the Harmony Endpoint portal which Overview shows the Active Alerts?
- A . The Policy Overview
- B . The Computer Management view
- C . The Operational Overview
- D . The Security Overview
Which option allows the Endpoint Security Management Server to modify client settings such as shutting down or restarting the client computers without installing policy?
- A . Remote Operations
- B . Node Management
- C . Remote Help
- D . Push Operations
What information does the Endpoint Client provide end users?
- A . Overview summary of all machines and their status.
- B . Overview summary of the protections deployed on the machines and the status of each protection.
- C . Overview summary of security breaches.
- D . Overview summary of traffic logs.
Name one way to install Endpoint Security clients:
- A . Third-party deployment tools
- B . Automatic using the server deployment rules
- C . Package import
- D . Manual deployment using the internet
How many Endpoint Security Client Package types exist?
- A . There are two main package types. Initial Client Package and Endpoint Security Client Packages.
- B . There are two packages. One for Windows and one for MacOS
- C . The administrator has to download all the appropriate packages from the UserCenter.
- D . There is only the initial package.