Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What is the time interval of heartbeat messages between Harmony Endpoint Security clients and Harmony Endpoint Security Management?

A.

60 milli-seconds

B.

60 minutes

C.

60 seconds

D.

30 seconds

How many digits are required in the FDE policy settings to enable a Very High-Security level for remote help on pre-boot?

A.

40 digits

B.

Maximum 30 digits

C.

24 digits

D.

Minimum 20 digits

What capabilities does the Harmony Endpoint NGAV include?

A.

Anti-Ransomware, Anti-Exploit & Behavioral Guard

B.

Anti-IPS, Anti-Firewall & Anti-Guard

C.

Zero-Phishing, Anti-Bot & Anti-Virus

D.

Threat Extraction, Threat-Emulation & Zero-Phishing

In a Standalone installation, the EMS is installed on the same computer or a different one than the NMS?

A.

Same

B.

Half on one and half on another computer

C.

Both

D.

Different

Which information can we find on the Operational Overview dashboard?

A.

Active Attacks, Deployment status, Pre-boot status, Anti-Malware update, Harmony Endpoint Version, and Operating system

B.

Active Endpoints, Active Alerts, Deployment status, Pre-boot status, Encryption Status

C.

Hosts under Attack, Active Attacks, Blocked Attacks

D.

Desktops, Servers, Active Alerts, Anti-Malware update, Harmony Endpoint Version

As an Endpoint Administrator, you are facing some errors related to AD Strong Authentication in the Endpoint Management Server. Where is the right place to look when you are troubleshooting these issues?

A.

$FWDIR/log/Authentication.log

B.

$FWDIR/logs/Auth.log

C.

$UEPMDIR/logs/Authentication.log

D.

$UEMPDlR/log/Authentication.elg

Which Endpoint capability ensures that protected computers comply with your organization's requirements and allows you to assign different security levels according to the compliance state of the endpoint computer?

A.

Compliance Check

B.

Capsule Cloud Compliance

C.

Forensics and Anti-Ransomware

D.

Full Disk Encryption

When does the pre-boot logon require users to authenticate?

A.

Before password verification

B.

Before the computer's main operating system starts

C.

Before they enter their username

D.

Before the credentials are verified

What does Unauthenticated mode mean?

A.

Computers and users might present a security risk, but still have access.

B.

Computers and users are trusted based on their IP address and username.

C.

Computers and users have credentials, but they are not verified through AD.

D.

Computers and users are trusted based on the passwords and usernames only.

One of the Data Security Software Capability protections included in the Harmony Endpoint solution is

A.

Data Leak Firewall

B.

Memory Encryption

C.

Dynamic Data Protection

D.

Remote Access VPN