Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

156-536 Check Point Certified Harmony Endpoint Specialist - R81.20 (CCES) Questions and Answers

Questions 4

When can administrators prepare the client for the FDE software package installation and deployment?

Options:

A.

Once a client meets the maximum system requirements

B.

Once the policy is installed

C.

Once the client system volumes have 32 MB of space

D.

Once a client machine meets the minimum system requirements

Buy Now
Questions 5

Where are quarantined files stored?

Options:

A.

On client computer, under C:\ProgramData\CheckPoint\Endpoint Security\Remediation\quarantine

B.

On client computer, under C:\ProgramData\CheckPoint\Harmony Endpoint Security\quarantine

C.

On Management server, under $FWDIR\sba\Remediation\quarantine

D.

On client computer, under C:\Program Files\CheckPoint\Endpoint Security\Remediation\quarantine

Buy Now
Questions 6

In the POLICY Tab of the Harmony Endpoint portal for each software capability (Threat Prevention, Data Protection, etc.), rules can be created to protect endpoint machines. Choose the true statement.

Options:

A.

The default rule is a global rule that only applies to Computers. Rules for Users must be added manually by the administrator.

B.

There are no rules to start with, and administrators must create rules in order to deploy the capability policies, actions, and behavior.

C.

There are only rules for the Harmony Endpoint Firewall capability. All other capabilities only include Actions.

D.

The default rule is a global rule which applies to all users and computers in the organization.

Buy Now
Questions 7

Media Encryption and Port Protection (MEPP) provide strong encryption for removable media, such as?

Options:

A.

USB drives, CD/DVDs, and SD cards, and for external ports

B.

Cables and Ethernet cords

C.

External ports only

D.

USB drives and CD/DVDs

Buy Now
Questions 8

How often does the AD scanner poll the server database for the current configuration settings?

Options:

A.

Every 60 minutes

B.

Every 150 minutes

C.

Every 120 minutes

D.

Every 30 minutes

Buy Now
Questions 9

What does the Endpoint Security Homepage offer useful resources for?

Options:

A.

Complicated Practices

B.

Best Practices

C.

Unix Client OS Support

D.

Quantum Management

Buy Now
Questions 10

The Endpoint administrator prepared deployment rules for remote deployment in a mixed desktop environment. Some of the non-Windows machines could not install Harmony Endpoint clients. What is the reason for this?

Options:

A.

macOS clients are not supported by Harmony Endpoint

B.

Administrator doesn’t run chmod command, to allow execution permission to the deployment script

C.

Deployment rules are not supported on macOS clients

D.

Deployment rules were assigned to users not to machines

Buy Now
Questions 11

Which User Roles are on the Endpoint Security Management Server for On-Premises servers?

Options:

A.

Primary Administrator and Read-Only

B.

Super Admin, Primary Administrator, User Admin, Read-Only

C.

Admin and Read-Only

D.

Super Admin, Read-Write All, Read-Only

Buy Now
Questions 12

What happens to clients that fail to meet the requirements?

Options:

A.

They have unenforced protections

B.

They have encryption issues

C.

They do not receive FDE protections

D.

They receive incomplete protections

Buy Now
Questions 13

What does Unauthenticated mode mean?

Options:

A.

Computers and users might present a security risk, but still have access.

B.

Computers and users are trusted based on their IP address and username.

C.

Computers and users have credentials, but they are not verified through AD.

D.

Computers and users are trusted based on the passwords and usernames only.

Buy Now
Questions 14

What type of attack is Ransomware?

Options:

A.

Where a victim encrypts files on a computer and demands payment for decryption key from an attacker.

B.

Where an attacker encrypts files on a computer and demands payment for decryption key.

C.

Ransomware is not an attack.

D.

Where an attacker decrypts files on a computer and demands payment for encryption key.

Buy Now
Questions 15

Which of the following is not protected by the Full Disk Encryption (FDE) software?

    Client's user data

    Operating system files

    Temporary files

    Erased files

Options:

A.

Temporary and erased files

B.

All of these are protected with FDE

C.

Erased files

D.

Temporary files

Buy Now
Questions 16

In addition to passwords, what else does the pre-boot environment also support?

Options:

A.

Options for remote authentication method

B.

Options for multi-factor authentication methods

C.

Options for double-factor authentication method

D.

Options for single-factor authentication method

Buy Now
Questions 17

When is the heartbeat initiated?

Options:

A.

During the first sync

B.

After the last sync

C.

Before the first sync

D.

After the first sync

Buy Now
Questions 18

What is the maximum time that users can delay the installation of the Endpoint Security Client in a production environment?

Options:

A.

2 Hours

B.

30 minutes

C.

48 Hours

D.

8 Hours

Buy Now
Questions 19

When using User Logon Pre-boot Remote Help, the following assistance is provided:

Options:

A.

Only One-Time Logon

B.

One-Time Logon and Remote Password Change

C.

Cleartext Password

D.

Only Remote Password Change

Buy Now
Questions 20

An innovative model that classifies new forms of malware into known malware families based on code and behavioral similarity is called

Options:

A.

Sanitization (CDR)

B.

Polymorphic Model

C.

Behavior Guard

D.

Anti-Ransomware

Buy Now
Questions 21

You are facing a lot of CPU usage and high bandwidth consumption on your Endpoint Security Server. You check and verify that everything is working as it should be, but the performance is still very slow. What can you do to decrease your bandwidth and CPU usage?

Options:

A.

The management High Availability sizing is not correct. You have to purchase more servers and add them to the cluster.

B.

Your company's size is not large enough to have a valid need for Endpoint Solution.

C.

Your company needs more bandwidth. You have to increase your bandwidth by 300%.

D.

You can use some of your Endpoints as Super Nodes since super nodes reduce bandwidth as well as CPU usage.

Buy Now
Questions 22

How many security levels can you set when enabling Remote Help on pre-boot?

Options:

A.

Four levels - Low security, Medium security, High security, Very High security

B.

Two levels - Low and High security

C.

Three levels - Low security, Medium security, High security

D.

One and only level - enable or disable security

Buy Now
Questions 23

What are the general components of Data Protection?

Options:

A.

Data protection includes VPN and Firewall capabilities.

B.

Full Disk Encryption (FDE), Media Encryption, and Port Protection.

C.

It supports SmartCard Authentication and Pre-Boot encryption.

D.

Only OneCheck in Pre-Boot environment.

Buy Now
Questions 24

By default, an FDE Action does what?

Options:

A.

Rebuilds the hard drive

B.

Decrypts all visible disk volumes

C.

Encrypts all visible disk volumes

D.

Re-defines all visible disk volumes

Buy Now
Questions 25

With which release of Endpoint Client is the Anti-Malware engine based on Sophos instead of Kaspersky?

Options:

A.

Endpoint Client release E86.26 and higher for Cloud deployments

B.

Endpoint Client release E84.40 and higher for all deployments

C.

Endpoint Client release E83.20 and higher for Cloud deployments

D.

Endpoint Client release E81.20 and higher for On-premises deployments

Buy Now
Questions 26

When you are facing a technical problem and you need help, what resource is recommended for all technical information about Check Point products?

Options:

A.

You can use an online search engine like Google and you will find the answer in the first results.

B.

Check Point SecureKnowledge, CheckMates, and Check Point Customer Support.

C.

You can use any infosec-related online sources.

D.

Press F1 in the SmartConsole and write down the problem.

Buy Now
Questions 27

Endpoint Security Clients are applications installed on company-owned desktop and laptop computers which include the following:

Options:

A.

Endpoint security software Capabilities and a device agent which operates as a container for the Capabilities and communicates with the Endpoint Management Server

B.

GUI client that connects to the Endpoint Security Management Server to manage the policy and other configuration for Endpoints

C.

Endpoint Security software Capabilities and a GUI client to manage policies for all capabilities

D.

GUI client that connects to the local Endpoint Capability Software to manage the policy and all other configuration for that Endpoint only

Buy Now
Questions 28

Which Harmony Endpoint environment is better choice for companies looking for more control when deploying the product?

Options:

A.

On-premises environment, because it offers more options for client deployments and features, same control over the operations as in Cloud environment but is more costly to support.

B.

Both On-premises and Cloud environment is the right choice. Both offer same control over the operations, when deploying the product only difference is in support cost.

C.

Cloud environment, because it offers easier deployment of servers, offers same control over operations as in On-premises environments, but is not as costly to support.

D.

On-premises environment, because it offers more options for deployment, greater control over operations, but is also more costly to support.

Buy Now
Questions 29

Before installing FDE on a client machine, what should administrators make sure of?

Options:

A.

That system volumes include at least 32 MB of continuous space

B.

That system volumes include at least 50 MB of continuous space

C.

That system volumes include at least 36 MB of continuous space

D.

That system volumes include at least 25 MB of continuous space

Buy Now
Exam Code: 156-536
Exam Name: Check Point Certified Harmony Endpoint Specialist - R81.20 (CCES)
Last Update: Jul 13, 2025
Questions: 98

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99