Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

156-536 Questions and Answers

Question # 6

In a Standalone installation, the EMS is installed on the same computer or a different one than the NMS?

A.

Same

B.

Half on one and half on another computer

C.

Both

D.

Different

Full Access
Question # 7

One of the ways to install Endpoint Security clients is ‘Automatic Deployment’. Which of this is true for automatic deployment of Endpoint Security clients?

A.

Automatic deployment can be done on any Windows machine with Check Point SmartConsole first installed

B.

Automatic deployment can be done on any Windows 10 machine without any Check Point component pre-installed

C.

For automatic deployment to work, the client system must have SVN Foundation enabled in Windows 10 or downloaded and installed on other operating systems

D.

Automatic deployment first requires installation of the Initial Client package, which is exported and distributed manually

Full Access
Question # 8

How is the Kerberos keytab file created?

A.

Using Kerberos principals

B.

Using the AD server

C.

Using encryption keys

D.

With the ktpass tool

Full Access
Question # 9

In the POLICY Tab of the Harmony Endpoint portal for each software capability (Threat Prevention, Data Protection, etc.), rules can be created to protect endpoint machines. Choose the true statement.

A.

The default rule is a global rule that only applies to Computers. Rules for Users must be added manually by the administrator.

B.

There are no rules to start with, and administrators must create rules in order to deploy the capability policies, actions, and behavior.

C.

There are only rules for the Harmony Endpoint Firewall capability. All other capabilities only include Actions.

D.

The default rule is a global rule which applies to all users and computers in the organization.

Full Access
Question # 10

Before installing the Endpoint Security Management Server, it is necessary to consider this:

A.

A Network Security Management Server must be installed.

B.

A Network Security Management Server must NOT be installed on the same machine.

C.

An Endpoint Security Gateway must be installed.

D.

MS SQL Server must be available with full admin access.

Full Access
Question # 11

The Push Operation Wizard allows users to select which three topics for Push Operations?

A.

Anti-Malware, Forensics and Remediation, Agent Settings

B.

Anti-Virus, Remediation, Agent Settings

C.

Anti-Malware, Analysis, Agent Deployment

D.

Anti-Ransomware, Forensics and Analysis, Agent Configurations

Full Access
Question # 12

External Policy Servers are placed between the Endpoint clients and the Endpoint Security Management Server. How many Policy Servers are supported per environment?

A.

From 1 to 25 Policy Servers are supported

B.

From 1 to 15 Policy Servers are supported

C.

From 1 to 20 Policy Servers are supported

D.

From 1 to 5 Policy Servers are supported

Full Access
Question # 13

What does FDE software combine to authorize access to data on desktop computers and laptops?

A.

Post-logon authentication and encryption

B.

OS boot protection with pre-boot authentication and encryption

C.

OS boot protection and post-boot authentication

D.

Decryption

Full Access
Question # 14

What is the default Agent Uninstall Password, which protects the client from unauthorized removal?

A.

Secret

B.

Chkp1234

C.

secret

D.

RemoveMe

Full Access
Question # 15

What are the general components of Data Protection?

A.

Data protection includes VPN and Firewall capabilities.

B.

Full Disk Encryption (FDE), Media Encryption, and Port Protection.

C.

It supports SmartCard Authentication and Pre-Boot encryption.

D.

Only OneCheck in Pre-Boot environment.

Full Access
Question # 16

By default, Endpoint Security Manager is configured as which kind of server?

A.

Network Server

B.

Webserver

C.

Management Server

D.

Log Server

Full Access
Question # 17

When is the heartbeat initiated?

A.

During the first sync

B.

After the last sync

C.

Before the first sync

D.

After the first sync

Full Access
Question # 18

How does Full Disk Encryption (FDE) add another layer of security?

A.

By offering media encryption

B.

By offering pre-boot protection

C.

By offering port protection

D.

By offering encryption

Full Access
Question # 19

What does pre-boot authentication disable?

A.

Workarounds to computer security

B.

Identity theft

C.

Incorrect usernames

D.

Weak passwords

Full Access
Question # 20

When in the Strong Authentication workflow is the database installed on the secondary server?

A.

After Endpoint Security is enabled

B.

Before Endpoint Security is enabled

C.

Exactly when Endpoint Security is enabled

D.

After synchronization and before Endpoint Security has been enabled

Full Access
Question # 21

The CISO office evaluates Check Point Harmony Endpoint and needs to know what kind of post-infection capabilities exist. Which post-infection capabilities does the Harmony Endpoint Suite include?

A.

IPS Attack Analysis (Forensics), Deploy and Destroy, and Isolation

B.

Automated Attack Analysis (Forensics), Remediation and Response, and Quarantine

C.

FW Attack Analysis (Forensics), Detect and Prevent, and Isolation

D.

IPS Attack Analysis (Forensics), Detect and Prevent, and Isolation

Full Access
Question # 22

The Remote Help tool can be used to assist users in password recovery. What type of assistance does this tool provide?

A.

The Remote Help tool only provides procedural information and FAQs about the Endpoint Security Client, including the procedure to reset the password

B.

The Remote Help tool provides:

a) User Logon Pre-boot Remote Help

b) Media Encryption Remote Help

C.

The Remote Help tool provides:

a) Link to the secret location of an encrypted password file

b) Key to decrypt the password file

D.

The Remote Help tool unlocks admin accounts on SmartEndpoint

Full Access
Question # 23

You're going to prepare a Deployment Scenario of an Endpoint Security Client on a Windows machine in an On-Prem environment. You choose one of two basic deployments - which is typical for a local deployment?

A.

Agent (Initial Client) package only

B.

Agent (Initial Client) and Software Blades packages

C.

Agent-less (no Client) and Software Blades packages

D.

Agent (free Client) package only

Full Access
Question # 24

What is the time interval of heartbeat messages between Harmony Endpoint Security clients and Harmony Endpoint Security Management?

A.

60 milli-seconds

B.

60 minutes

C.

60 seconds

D.

30 seconds

Full Access
Question # 25

Does the Endpoint Client GUI provide automatic or manual prompting to protect removable storage media usage?

A.

Manual Only

B.

Either automatic or manual

C.

Automatic Only

D.

Neither automatic nor manual

Full Access
Question # 26

Which option allows the Endpoint Security Management Server to modify client settings such as shutting down or restarting the client computers without installing policy?

A.

Remote Operations

B.

Node Management

C.

Remote Help

D.

Push Operations

Full Access
Question # 27

When using User Logon Pre-boot Remote Help, the following assistance is provided:

A.

Only One-Time Logon

B.

One-Time Logon and Remote Password Change

C.

Cleartext Password

D.

Only Remote Password Change

Full Access
Question # 28

What information does the Endpoint Client provide end users?

A.

Overview summary of all machines and their status.

B.

Overview summary of the protections deployed on the machines and the status of each protection.

C.

Overview summary of security breaches.

D.

Overview summary of traffic logs.

Full Access
Question # 29

Which Harmony Endpoint environment is better choice for companies looking for more control when deploying the product?

A.

On-premises environment, because it offers more options for client deployments and features, same control over the operations as in Cloud environment but is more costly to support.

B.

Both On-premises and Cloud environment is the right choice. Both offer same control over the operations, when deploying the product only difference is in support cost.

C.

Cloud environment, because it offers easier deployment of servers, offers same control over operations as in On-premises environments, but is not as costly to support.

D.

On-premises environment, because it offers more options for deployment, greater control over operations, but is also more costly to support.

Full Access