Site icon Exam4Training

Check Point 156-536 Check Point Certified Harmony Endpoint Specialist – R81.20 Online Training

Question #1

What communication protocol does Harmony Endpoint management use to communicate with the management server?

  • A . SIC
  • B . CPCOM
  • C . TCP
  • D . UDP

Reveal Solution Hide Solution

Correct Answer: B
Question #2

"Heartbeat" refers to what?

  • A . A periodic client connection to the server
  • B . A client connection that happens every 60 seconds
  • C . A server connection that happens every 5 minutes
  • D . A random server connection

Reveal Solution Hide Solution

Correct Answer: A
Question #3

What are the benefits of the Check Point Consolidated Cyber Security Architecture?

  • A . Consolidated network functions
  • B . Single policy
  • C . decentralized management
  • D . Consolidated security functions

Reveal Solution Hide Solution

Correct Answer: D
Question #4

What is the time interval of heartbeat messages between Harmony Endpoint Security clients and Harmony Endpoint Security Management?

  • A . 60 milli-seconds
  • B . 60 minutes
  • C . 60 seconds
  • D . 30 seconds

Reveal Solution Hide Solution

Correct Answer: C
Question #5

Which of the following is TRUE about the functions of Harmony Endpoint components

  • A . SmartEndpoint connects to the Check Point Security Management Server (SMS)
  • B . SmartEndpoint Console connects to and manages the Endpoint Management Server (EMS)
  • C . SmartConsole connects to and manages the Endpoint Management Server (EMS)
  • D . Web Management Console for Endpoint connects to the Check Point Security Management Server (SMS)

Reveal Solution Hide Solution

Correct Answer: C
Question #6

What GUI options do you have to access the Endpoint Security Management Server in a cloud environment?

  • A . Infinity Portal and Web Management Console
  • B . SmartConsoleandGaiaWebUI
  • C . Nothing, there is no Cloud Support for Endpoint Management Server.
  • D . SmartEndpoint Distributor

Reveal Solution Hide Solution

Correct Answer: A
Question #7

What does the Endpoint Security Homepage offer useful resources for?

  • A . Complicated Practices
  • B . Best Practices
  • C . Unix Client OS Support
  • D . Quantum Management

Reveal Solution Hide Solution

Correct Answer: B
Question #8

On which search engines/web sites is the Safe Search feature supported in Harmony Endpoint?

  • A . Google. Bing, Yahoo! by default, and extra support for Baidu, Yandex, Lycos and Excite if the Harmony Endpoint Management is deployed in Cloud
  • B . Google, Bing, and Yahoo!
  • C . Google and Bing if the Harmony Endpoint Management is On-Premises deployment
  • D . Google, Yahoo! and OneSearch

Reveal Solution Hide Solution

Correct Answer: B
Question #9

What is default Agent Uninstall Password, which protect client from unauthorized removal?

  • A . Secret
  • B . Chkp1234
  • C . secret
  • D . RemoveMe

Reveal Solution Hide Solution

Correct Answer: C
Question #10

With which release of Endpoint Client is the Anti-Malware engine based on Sophos instead to Kaspersky?

  • A . Endpoint Client release E86.26 and higher for Cloud deployments
  • B . Endpoint Client release E84.40 and higher for all deployments
  • C . Endpoint Client release E83.20 and higher for Cloud deployments
  • D . Endpoint Client release E81.20 and higher for On-premises deployments

Reveal Solution Hide Solution

Correct Answer: B

Question #11

What does the Check Point Support Center as your one-stop portal offer?

  • A . UserMates offline discussion boards
  • B . Technical Certification
  • C . SecureKnowledge technical database
  • D . Offloads

Reveal Solution Hide Solution

Correct Answer: C
Question #12

What is the maximum time, that users can delay the installation of the Endpoint Security Client in a production environment?

  • A . 2 Hours
  • B . 30 minutes
  • C . 48 Hours
  • D . 8 Hours

Reveal Solution Hide Solution

Correct Answer: C
Question #13

What is the command required to be run to start the Endpoint Web Interface for on-premises Harmony Endpoint Web Interface access?

  • A . start_web_mgmt – run in dish
  • B . start_web_mgmt – run in expert mode
  • C . web_mgmt_start – run in expert mode
  • D . web_mgmt_start – run in dish

Reveal Solution Hide Solution

Correct Answer: A
Question #14

What are the General components of Data Protection?

  • A . Data protection includes VPN. and Firewall capabilities.
  • B . Full Disk Encryption (FDE). Media Encryption and Port Protection.
  • C . it supports SmartCard Authentication and Pre-Boot encryption.
  • D . Only OneCheck in Pre-Boot environment.

Reveal Solution Hide Solution

Correct Answer: B
Question #15

Where are quarantined files stored?

  • A . On client computer, under C:ProgramDataCheckPointEndpoint SecurityRemediationquarantlne
  • B . On client computer, under C:ProgramDataCheckPointHarmony Endpoint Securityquarantine
  • C . On Management server, under $FWDIRsbaRemediationquarantine
  • D . On client computer, under C:Program FilesCheckPointEndpoint SecurityRemedlaiionquarantine

Reveal Solution Hide Solution

Correct Answer: B
Question #16

What connect options does the connection Awareness support?

  • A . There are two options: Connected and Disconnected
  • B . Master and Slave Endpoint Security Management Server.
  • C . Client and Server model based on Idap model. The supported ports are 389 and 636.
  • D . There are two options: Connected to Management and Connected to a List of Specified Targets.

Reveal Solution Hide Solution

Correct Answer: D
Question #17

Which information can we find on the Operational Overview dashboard?

  • A . Active Attacks. Deployment status. Pre-boot status, Anti-Malware update. Harmony Endpoint Version and Operating system
  • B . Active Endpoints. Active Alerts, Deployment status, Pre-boot status, Encryption Status
  • C . Hosts under Attack, Active Attacks, Blocked Attacks
  • D . Desktops. Servers, Active Alerts, Anti-Malware update, Harmony Endpoint Version

Reveal Solution Hide Solution

Correct Answer: B
Question #18

Which command in CLI session is used to check installed licenses on Harmony Endpoint Management server?

  • A . cplic print-x
  • B . show licenses all
  • C . cplic add <license filename>
  • D . cplic print +x

Reveal Solution Hide Solution

Correct Answer: A
Question #19

What blades have to be enabled on the Management Server in order for the Endpoint Security Management Server to operate?

  • A . You can enable all gateway related blades.
  • B . The administrator has to enable compliance and Network Policy Management.
  • C . Logging & Status, SmartEvent Server, and SmartEvent Correlation unit must be enabled.
  • D . The SmartEndPoint super Node on the Management.

Reveal Solution Hide Solution

Correct Answer: C
Question #20

When you are facing a technical problem and you need help, what resource is recommended for all technical information about Check Point products?

  • A . You can use an online search engine like Google and you will find the answer in the first results.
  • B . Check Point SecureKnowledge, CheckMates and Check Point Customer Support.
  • C . You ca use any infosec related online sources.
  • D . Press F1 in the SmartConsole and write down the problem.

Reveal Solution Hide Solution

Correct Answer: B

Question #21

In the OVERVIEW Tab of the Harmony Endpoint portal which Overview shows the Active Alerts?

  • A . The Policy Overview
  • B . The Computer Management view
  • C . The Operational Overview
  • D . The Security Overview

Reveal Solution Hide Solution

Correct Answer: C
Question #22

Which option allows the Endpoint Security Management Server to modify client settings such as shutting down or restarting the client computers without installing policy?

  • A . Remote Operations
  • B . Node Management
  • C . Remote Help
  • D . Push Operations

Reveal Solution Hide Solution

Correct Answer: D
Question #23

What information does the Endpoint Client provide end users?

  • A . Overview summary of all machines and their status.
  • B . Overview summary of the protections deployed on the machines and the status of each protection.
  • C . Overview summary of security breaches.
  • D . Overview summary of traffic logs.

Reveal Solution Hide Solution

Correct Answer: B
Question #24

Name one way to install Endpoint Security clients:

  • A . Third-party deployment tools
  • B . Automatic using the server deployment rules
  • C . Package import
  • D . Manual deployment using the internet

Reveal Solution Hide Solution

Correct Answer: B
Question #25

How many Endpoint Security Client Package types exist?

  • A . There are two main package types. Initial Client Package and Endpoint Security Client Packages.
  • B . There are two packages. One for Windows and one for MacOS
  • C . The administrator has to download all the appropriate packages from the UserCenter.
  • D . There is only the initial package.

Reveal Solution Hide Solution

Correct Answer: A
Exit mobile version