Check Point Certified Harmony Endpoint Specialist - R81.20 (CCES) v1.0

Page:    1 / 7   
Exam contains 96 questions

On which desktop operating systems are Harmony Endpoint Clients supported?

  • A. Windows, MacOS, Linux and Unix
  • B. Only Windows and MacOS
  • C. Windows Servers and Clients, MacOS and Linux
  • D. Windows Client, MacOS and Linux


Answer : D

Name one way to install Endpoint Security clients:

  • A. Third-party deployment tools
  • B. Automatic using the server deployment rules
  • C. Package import
  • D. Manual deployment using the internet


Answer : B

When does the pre-boot logon require users to authenticate?

  • A. Before password verification
  • B. Before the computer’s main operating system starts
  • C. Before they enter their username
  • D. Before the credentials are verified


Answer : B

In addition to passwords, what else does the pre-boot environment also support?

  • A. Options for remote authentication method
  • B. Options for multi-factor authentication methods
  • C. Options for double-factor authentication method
  • D. Options for single-factor authentication method


Answer : B

You must make a decision of which FDE algorithm to be used by one of your clients who specializes in multimedia video editing. What algorithm will you choose?

  • A. The implementation of a Secure VPN with very strong encryption will make your data invisible in cases of live internet transmission.
  • B. In Multimedia applications you do not need to implement any kind of Full disk encryption. You can use software like 7Zip in order to encrypt your data.
  • C. Any kind of data is very important and the Full Disk Encryption technic must be used with the strongest secret key possible. Your client has to use strong encryption like XTS-AES 256 bit.
  • D. Video processing is a high bandwidth application which utilizes a lot of HDD access time. You have to use an FDE algorithm with small secret key like XTS-AES 128 bit.


Answer : C

Full Disk Encryption (FDE) protects data at rest stored on _____.

  • A. RAM Drive
  • B. SMB Share
  • C. NFS Share
  • D. Hard Drive


Answer : D

What does the Data protection/General rule contain?

  • A. Actions that define user authentication settings only
  • B. Actions that define decryption settings for hard disks
  • C. Actions that restore encryption settings for hard disks and change user authentication settings
  • D. Actions that define port protection settings and encryption settings for hard disks and removable media


Answer : D

The company's new admin must take care of the states of the Endpoint policy to have compliant endpoints in any case. What are the available Policy Types (States)?

  • A. The endpoint user can select between local firewall and remote endpoint security Policy type.
  • B. There are two Policy types: Online and Offline.
  • C. There are three Policy Types (States): Connected, Disconnected and Restricted.
  • D. There is only one Endpoint Security Policy.


Answer : C

What does pre-boot authentication disable?

  • A. Workarounds to computer security
  • B. Identity theft
  • C. Incorrect usernames
  • D. Weak passwords


Answer : D

The Remote Help tool can be used to assist users in password recovery. What type of assistance does this tool provide?

  • A. The Remote Help only provides procedural information and FAQs about the Endpoint Security Client including procedure to reset password
  • B. The Remote Help tool provides
    a) User Logon Pre-boot Remote Help
    b) Media Encryption Remote Help
  • C. The Remote Help tool provides
    a) Link to the secret location of encrypted password file
    b) Key to decrypt the password file
  • D. The Remote Help tool unlocks admin accounts on SmartEndpoint


Answer : B

Check Point Full Disk Encryption contains two main components - what are the two main components?

  • A. Media Encryption & Pre-UEFI Authentication
  • B. Disk Encryption & Pre-Boot Authentication
  • C. Port Encryption & After-Boot Authentication
  • D. Disk Encryption & 2FAAuthentication


Answer : B

What does Port Protection protect, and why?

  • A. Activity on the ports of a client computer to help prevent data leakage
  • B. Activity on the ports of a client computer to review logs
  • C. Activity on the ports of a client computer to help unauthorized user access
  • D. Activity on the ports of a client computer to monitor devices


Answer : A

What does pre-boot protection require of users?

  • A. To authenticate before the computer will start
  • B. To answer a security question after login
  • C. To authenticate before the computer’s OS starts
  • D. To regularly change passwords


Answer : C

Which of the following is not protected by the Full Disk Encryption (FDE) software?
1) Client’s user data
2) Operating system files
3) Temporary files
4) Erased files

  • A. Temporary and erased files
  • B. All of these are protected with FDE
  • C. Erased files
  • D. Temporary files


Answer : C

An Innovative model that classifies new forms of malware into known malware families based on code and behavioral similarity is called:

  • A. Sanitization (CDR)
  • B. Polymorphic Model
  • C. Behavior Guard
  • D. Anti-Ransomware


Answer : B

Page:    1 / 7   
Exam contains 96 questions

Talk to us!


Have any questions or issues ? Please dont hesitate to contact us

Certlibrary.com is owned by MBS Tech Limited: Room 1905 Nam Wo Hong Building, 148 Wing Lok Street, Sheung Wan, Hong Kong. Company registration number: 2310926
Certlibrary doesn't offer Real Microsoft Exam Questions. Certlibrary Materials do not contain actual questions and answers from Cisco's Certification Exams.
CFA Institute does not endorse, promote or warrant the accuracy or quality of Certlibrary. CFA® and Chartered Financial Analyst® are registered trademarks owned by CFA Institute.
Terms & Conditions | Privacy Policy