Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

Which User Roles are on the Endpoint Security Management Server for On-Premises servers?

A.

Primary Administrator and Read-Only

B.

Super Admin, Primary Administrator, User Admin, Read-Only

C.

Admin and Read-Only

D.

Super Admin, Read-Write All, Read-Only

Full Access
Question # 5

In the POLICY Tab of the Harmony Endpoint portal for each software capability (Threat Prevention, Data Protection, etc.), rules can be created to protect endpoint machines. Choose the true statement.

A.

The default rule is a global rule that only applies to Computers. Rules for Users must be added manually by the administrator.

B.

There are no rules to start with, and administrators must create rules in order to deploy the capability policies, actions, and behavior.

C.

There are only rules for the Harmony Endpoint Firewall capability. All other capabilities only include Actions.

D.

The default rule is a global rule which applies to all users and computers in the organization.

Full Access
Question # 6

Before installing FDE on a client machine, what should administrators make sure of?

A.

That system volumes include at least 32 MB of continuous space

B.

That system volumes include at least 50 MB of continuous space

C.

That system volumes include at least 36 MB of continuous space

D.

That system volumes include at least 25 MB of continuous space

Full Access
Question # 7

What blades have to be enabled on the Management Server for the Endpoint Security Management Server to operate?

A.

You can enable all gateway-related blades

B.

The administrator has to enable Compliance and Network Policy Management

C.

Logging & Status, SmartEvent Server, and SmartEvent Correlation unit must be enabled

D.

The SmartEndpoint super Node on the Management

Full Access
Question # 8

The Harmony Endpoint solution includes which three Data Security Software Capability protections?

A.

• Full Disk Encryption

• Media Encryption

• Anti-Malware

B.

• Passwords and Usernames

• Port Protection (MEPP)

• Security Questions

C.

• Media Encryption

• Media Decryption

• Remote Access VPN

D.

• Full Disk Encryption

• Media Encryption & Port Protection (MEPP)

• Remote Access VPN

Full Access
Question # 9

With which release of Endpoint Client is the Anti-Malware engine based on Sophos instead of Kaspersky?

A.

Endpoint Client release E86.26 and higher for Cloud deployments

B.

Endpoint Client release E84.40 and higher for all deployments

C.

Endpoint Client release E83.20 and higher for Cloud deployments

D.

Endpoint Client release E81.20 and higher for On-premises deployments

Full Access
Question # 10

What connection options does Connection Awareness support?

A.

There are two options: Connected and Disconnected

B.

Master and Slave Endpoint Security Management Server

C.

Client and Server model based on LDAP model. The supported ports are 389 and 636

D.

There are two options: Connected to Management and Connected to a List of Specified Targets

Full Access
Question # 11

Does the Endpoint Client GUI provide automatic or manual prompting to protect removable storage media usage?

A.

Manual Only

B.

Either automatic or manual

C.

Automatic Only

D.

Neither automatic nor manual

Full Access
Question # 12

The Endpoint administrator prepared deployment rules for remote deployment in a mixed desktop environment. Some of the non-Windows machines could not install Harmony Endpoint clients. What is the reason for this?

A.

macOS clients are not supported by Harmony Endpoint

B.

Administrator doesn’t run chmod command, to allow execution permission to the deployment script

C.

Deployment rules are not supported on macOS clients

D.

Deployment rules were assigned to users not to machines

Full Access
Question # 13

On which desktop operating systems are Harmony Endpoint Clients supported?

A.

Windows, macOS, Linux and Unix

B.

Only Windows and macOS

C.

Windows Servers and Clients, macOS and Linux

D.

Windows Client, macOS and Linux

Full Access
Question # 14

An innovative model that classifies new forms of malware into known malware families based on code and behavioral similarity is called

A.

Sanitization (CDR)

B.

Polymorphic Model

C.

Behavior Guard

D.

Anti-Ransomware

Full Access
Question # 15

Which information can we find on the Operational Overview dashboard?

A.

Active Attacks, Deployment status, Pre-boot status, Anti-Malware update, Harmony Endpoint Version, and Operating system

B.

Active Endpoints, Active Alerts, Deployment status, Pre-boot status, Encryption Status

C.

Hosts under Attack, Active Attacks, Blocked Attacks

D.

Desktops, Servers, Active Alerts, Anti-Malware update, Harmony Endpoint Version

Full Access
Question # 16

What are the benefits of the Check Point Consolidated Cyber Security Architecture?

A.

Consolidated network functions

B.

Single policy

C.

Decentralized management

D.

Consolidated security functions

Full Access
Question # 17

Which command in a CLI session is used to check installed licenses on the Harmony Endpoint Management Server?

A.

cplic print -x

B.

show licenses all

C.

cplic add
D. cplic print +x

Full Access
Question # 18

Name one way to install Endpoint Security clients:

A.

Third-party deployment tools

B.

Automatic using the server deployment rules

C.

Package import

D.

Manual deployment using the internet

Full Access
Question # 19

The Remote Help tool can be used to assist users in password recovery. What type of assistance does this tool provide?

A.

The Remote Help tool only provides procedural information and FAQs about the Endpoint Security Client, including the procedure to reset the password

B.

The Remote Help tool provides:

a) User Logon Pre-boot Remote Help

b) Media Encryption Remote Help

C.

The Remote Help tool provides:

a) Link to the secret location of an encrypted password file

b) Key to decrypt the password file

D.

The Remote Help tool unlocks admin accounts on SmartEndpoint

Full Access
Question # 20

When using User Logon Pre-boot Remote Help, the following assistance is provided:

A.

Only One-Time Logon

B.

One-Time Logon and Remote Password Change

C.

Cleartext Password

D.

Only Remote Password Change

Full Access
Question # 21

What does the Endpoint Security Homepage offer useful resources for?

A.

Complicated Practices

B.

Best Practices

C.

Unix Client OS Support

D.

Quantum Management

Full Access
Question # 22

How is the Kerberos keytab file created?

A.

Using Kerberos principals

B.

Using the AD server

C.

Using encryption keys

D.

With the ktpass tool

Full Access
Question # 23

By default, Endpoint Security Manager is configured as which kind of server?

A.

Network Server

B.

Webserver

C.

Management Server

D.

Log Server

Full Access
Question # 24

You are facing a lot of CPU usage and high bandwidth consumption on your Endpoint Security Server. You check and verify that everything is working as it should be, but the performance is still very slow. What can you do to decrease your bandwidth and CPU usage?

A.

The management High Availability sizing is not correct. You have to purchase more servers and add them to the cluster.

B.

Your company's size is not large enough to have a valid need for Endpoint Solution.

C.

Your company needs more bandwidth. You have to increase your bandwidth by 300%.

D.

You can use some of your Endpoints as Super Nodes since super nodes reduce bandwidth as well as CPU usage.

Full Access
Question # 25

Media Encryption and Port Protection (MEPP) provide strong encryption for removable media, such as?

A.

USB drives, CD/DVDs, and SD cards, and for external ports

B.

Cables and Ethernet cords

C.

External ports only

D.

USB drives and CD/DVDs

Full Access
Question # 26

What communication protocol does Harmony Endpoint management use to communicate with the management server?

A.

SIC

B.

CPCOM

C.

TCP

D.

UDP

Full Access
Question # 27

You must make a decision of which FDE algorithm to be used by one of your clients who specializes in multimedia video editing. What algorithm will you choose?

A.

The implementation of a Secure VPN with very strong encryption will make your data invisible in cases of live internet transmission.

B.

In multimedia applications you do not need to implement any kind of Full Disk Encryption. You can use software like 7Zip in order to encrypt your data.

C.

Any kind of data is very important and the Full Disk Encryption technique must be used with the strongest secret key possible. Your client has to use strong encryption like XTS-AES 256 bit.

D.

Video processing is a high bandwidth application which utilizes a lot of HDD access time. You have to use a FDE algorithm with small secret key like XTS-AES 128 bit.

Full Access
Question # 28

The CEO of the company uses the latest Check Point Endpoint client on his laptop. All capabilities are enabled, and FDE has been applied. The CEO is on a business trip and remembers that he needs to send some important emails, so he is forced to boot up his laptop in a public area. However, he suddenly needs to leave and forgets to lock or shut down his computer. The laptop remains unattended. Is the CEO’s data secured?

A.

The data is not secured. The laptop was left unlocked in the email client window. Everyone who accesses the laptop, before it automatically locks, has access to all data.

B.

The laptop is not secure because anyone in the local connected Wi-Fi can access the CEO’s corporate data.

C.

The laptop is totally secure since the Endpoint client will automatically detect the emergency and has set the OS in hibernate mode.

D.

The laptop is using the latest technology for Full Disk Encryption. Anyone who finds the laptop can’t access its data due to the data encryption used.

Full Access
Question # 29

What happens to clients that fail to meet the requirements?

A.

They have unenforced protections

B.

They have encryption issues

C.

They do not receive FDE protections

D.

They receive incomplete protections

Full Access