Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

156-536 Exam Dumps - Check Point Certified Harmony Endpoint Specialist - R81.20 (CCES)

Go to page:
Question # 9

What does Port Protection protect, and why?

A.

Activity on the ports of a client computer to help prevent data leakage

B.

Activity on the ports of a client computer to review logs

C.

Activity on the ports of a client computer to help unauthorized user access

D.

Activity on the ports of a client computer to monitor devices

Full Access
Question # 10

When is the heartbeat initiated?

A.

During the first sync

B.

After the last sync

C.

Before the first sync

D.

After the first sync

Full Access
Question # 11

The Push Operation Wizard allows users to select which three topics for Push Operations?

A.

Anti-Malware, Forensics and Remediation, Agent Settings

B.

Anti-Virus, Remediation, Agent Settings

C.

Anti-Malware, Analysis, Agent Deployment

D.

Anti-Ransomware, Forensics and Analysis, Agent Configurations

Full Access
Question # 12

You must make a decision of which FDE algorithm to be used by one of your clients who specializes in multimedia video editing. What algorithm will you choose?

A.

The implementation of a Secure VPN with very strong encryption will make your data invisible in cases of live internet transmission.

B.

In multimedia applications you do not need to implement any kind of Full Disk Encryption. You can use software like 7Zip in order to encrypt your data.

C.

Any kind of data is very important and the Full Disk Encryption technique must be used with the strongest secret key possible. Your client has to use strong encryption like XTS-AES 256 bit.

D.

Video processing is a high bandwidth application which utilizes a lot of HDD access time. You have to use a FDE algorithm with small secret key like XTS-AES 128 bit.

Full Access
Question # 13

By default, an FDE Action does what?

A.

Rebuilds the hard drive

B.

Decrypts all visible disk volumes

C.

Encrypts all visible disk volumes

D.

Re-defines all visible disk volumes

Full Access
Question # 14

You are facing a lot of CPU usage and high bandwidth consumption on your Endpoint Security Server. You check and verify that everything is working as it should be, but the performance is still very slow. What can you do to decrease your bandwidth and CPU usage?

A.

The management High Availability sizing is not correct. You have to purchase more servers and add them to the cluster.

B.

Your company's size is not large enough to have a valid need for Endpoint Solution.

C.

Your company needs more bandwidth. You have to increase your bandwidth by 300%.

D.

You can use some of your Endpoints as Super Nodes since super nodes reduce bandwidth as well as CPU usage.

Full Access
Question # 15

What is the command required to be run to start the Endpoint Web Interface for on-premises Harmony Endpoint Web Interface access?

A.

start_web_mgmt - run in dish

B.

start_web_mgmt - run in expert mode

C.

web_mgmt_start - run in expert mode

D.

web_mgmt_start - run in dish

Full Access
Question # 16

Is it possible to change the encryption algorithm on a fully encrypted disk, without need to decrypt it first? Is it possible to re-encrypt the disk on-the-fly?

A.

Changing the encryption algorithm is only supported on machines with legacy BIOS firmware. EFI or UEFI Firmware is not supported.

B.

Changing the encryption algorithm is supported on all machines, but you must first decrypt it, change encryption algorithm, and encrypt it again with new encryption algorithm.

C.

Changing the encryption algorithm is supported on all machines, no matter which firmware they have.

D.

Changing the encryption algorithm is only on machines that have EFI or IJEFI firmware. BIOS Firmware is not supported.

Full Access
Go to page: