Which option allows the Endpoint Security Management Server to modify client settings such as shutting down or restarting the client computers without installing policy?
ARemote operations
BNode Management
CRemote Help
DPush Operations
The Endpoint administrator prepared deployment rules for remote deployment in a mixed desktop environment. Some of the Non-Windows machines could not install Harmony endpoint clients. What is the reason for this?
AMacOS clients are not supported by Harmony Endpoint
BAdministrator doesn't run chmod command, to allow execution permission to the deployment script
CDeployment rules are not supported on MacOS clients
DDeployment rules was assigned to users not to machines
What is the maximum time, that users can delay the installation of the Endpoint Security Client in a production environment?
A2 Hours
B30 minutes
C48 Hours
D8 Hours
When deploying a policy server, which is important?
ATo have policies in place
BTo configure the heartbeat interval and define the amount of time that the client is allowed to connect to the server
CTo configure the EPS and define the amount of time that the client is allowed to connect to the SMS
DTo install the heartbeat server first
Question 6
Troubleshooting and Monitoring
0
Question 7
Threat Prevention
Question 8
Threat Prevention
Question 9
Threat Prevention
Question 10
Harmony Endpoint Deployment
Question 11
Harmony Endpoint Deployment
Question 12
Harmony Endpoint Components
Question 13
Harmony Endpoint Components
Question 14
Harmony Endpoint Deployment
Question 15
Harmony Endpoint Deployment
Question 16
Threat Prevention
Question 17
Threat Prevention
Question 18
Policy and Profiles
Question 19
Policy and Profiles
Question 20
Threat Prevention
Question 21
Troubleshooting and Monitoring
Question 22
Harmony Endpoint Deployment
Question 23
Policy and Profiles
Question 24
Harmony Endpoint Deployment
Question 25
Policy and Profiles
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ad
Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
How often does the AD scanner poll the server database for the current configuration settings?
AEvery 60 minutes
BEvery 150 minutes
CEvery 120 minutes
DEvery 30 minutes
The CEO of the company uses the latest Check Point Endpoint client on his laptop. All capabilities are enabled and FDE has been applied. The CEO is on a business trip and remembers that he needs to send some important emails, so he is forced to boot up his laptop in a public area. However, he suddenly needs to leave and forgets to lock or shut down his computer. The laptop remains unattended. Is the CEO’s data secured?
AThe data is not secured. The laptop was left unlocked in the email client window. Everyone who accesses the laptop, before it automatic locks, has access to all data.
BThe laptop is not secure because anyone in the local connected Wi-Fi can access the CEOs corporate data.
CThe laptop is totally secure since the Endpoint client will automatically detect the emergency and has set the OS in hibernate mode.
DThe laptop is using the latest technology for Full Disk encryption. Anyone who finds the laptop can’t access its data due to the data encryption used.
How does FDE add another layer of security?
ABy offering media encryption
BBy offering pre-boot protection
CBy offering port protection
DBy offering encryption
Does the Endpoint Client GUI provide automatic or manual prompting to protect removable storage media usage?
AManual Only
BEither automatic or manual
CAutomatic Only
DNeither automatic or manual
You're going to prepare a Deployment Scenario of an Endpoint Security Client on a Windows machine in an On-Prem environment. You choose one of two basic deployments - which is typical for a local deployment?
AAgent (Initial Client) package only
BAgent (Initial Client) and Software Blades packages
CAgent-less (no Client) and Software Blades packages
DAgent (free Client) package only
Name one way to install Endpoint Security clients:
AThird-party deployment tools
BAutomatic using the server deployment rules
CPackage import
DManual deployment using the internet
When using User Logon Pre-boot Remote Help, the following assistance is provided:
AOnly One-Time Logon
BOne-Time Logon and Remote Password Change
CCleartext Password
DOnly Remote Password Change
What does the Kerberos key tab file contain?
APairs of authentication settings and un-authentication settings
BPairs of encryption and decryption keys
CPairs of Kerberos principals and encryption keys
DPairs of ktpass tools
How is the Kerberos key tab file created?
AUsing Kerberos principals
BUsing the AD server
CUsing encryption keys
DWith the ktpass tool
When in the Strong Authentication workflow is the database installed on the secondary server?
AAfter Endpoint security is enabled
BBefore Endpoint security is enabled
CExactly when Endpoint security is enabled
DAfter synchronization and before Endpoint security has been enabled
Media Encryption and Port Protection (MEPP) provide strong encryption for removable media, such as?
AUSB drives, CD/DVDs, and SD cards, and for external ports
BCables and Ethernet cords
CExternal ports only
DUSB drives and CD/DVDs
You are facing a lot of CPU usage and high bandwidth consumption on your Endpoint Security Server. You check and verify that everything is working as it should be, but the performance is still very slow. What can you do to decrease your bandwidth and CPU?
AThe managements High Availability sizing is not correct. You have to purchase more servers and add them to the cluster.
BYour company’s size is not large enough to have a valid need for Endpoint Solution.
CYour company needs more bandwidth. You have to increase your bandwidth by 300%
DYou can use some of your Endpoints as Super Nodes since super nodes reduces bandwidth as well as CPU usage.
External Policy Servers are placed between the Endpoint clients and the Endpoint Security Management Server. What benefit does the External Endpoint Policy Server bring?
ACluster and Delta requests
BHeartbeat and synchronization requests
CTest packet and delta requests
DPolling beat and delta requests
External Endpoint policy servers (EPS) decrease X and reduce X between sites?
ADecrease policies and reduce traffic between sites
BDecrease power and reduce accidents between sites
CDecrease clients and reduce device agents between sites
DExternal Endpoint policy servers (EPS) decrease the load of the EMS and reduce the bandwidth required between sites
What does pre-boot protection prevent?
AUnauthorized access to the Remote Help bypass tools or alternative boot technical support methods
BUnauthorized passwords or alternative “forgot passwords” methods during pre-boot
CUnauthorized users using post-boot methods
DPrevents unauthorized access to the operating system or bypass of boot protection
As an Endpoint Administrator you are facing with some errors related to AD Strong Authentication in Endpoint Management server. Where is the right place to look when you are troubleshooting these issues?
A$FWDIR/log/Authentication.log
B$FWDIR/logs/Auth.log
C$UEPMDIR/logs/Authentication.log
D$UEPMDIR/log/Authentication.elg
What blades have to be enabled on the Management Server in order for the Endpoint Security Management Server to operate?
AYou can enable all gateway related blades.
BThe administrator has to enable compliance and Network Policy Management.
CLogging & Status, SmartEvent Server, and SmartEvent Correlation unit must be enabled.
DThe SmartEndPoint super Node on the Management.
What connect options does the connection Awareness support?
AThere are two options: Connected and Disconnected.
BMaster and Slave Endpoint Security Management Server.
CClient and Server model based on ldap model. The supported ports are 389 and 636.
DThere are two options: Connected to Management and Connected to a List of Specified Targets.
What does Unauthenticated mode mean?
AComputers and users might present a security risk, but still have access.
BComputers and users are trusted based on their IP address and username.
CComputers and users have credentials, but they are not verified through AD.
DComputers and users are trusted based on the passwords and usernames only.
What is the default encryption algorithm in Full Disk Encryption tab under Advanced Settings?