Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What are the general components of Data Protection?

A.

Data protection includes VPN and Firewall capabilities.

B.

Full Disk Encryption (FDE), Media Encryption, and Port Protection.

C.

It supports SmartCard Authentication and Pre-Boot encryption.

D.

Only OneCheck in Pre-Boot environment.

What does the Kerberos keytab file contain?

A.

Pairs of authentication settings and un-authentication settings

B.

Pairs of encryption and decryption keys

C.

Pairs of Kerberos principals and encryption keys

D.

Pairs of ktpass tools

How is the Kerberos keytab file created?

A.

Using Kerberos principals

B.

Using the AD server

C.

Using encryption keys

D.

With the ktpass tool

What is the command required to be run to start the Endpoint Web Interface for on-premises Harmony Endpoint Web Interface access?

A.

start_web_mgmt - run in dish

B.

start_web_mgmt - run in expert mode

C.

web_mgmt_start - run in expert mode

D.

web_mgmt_start - run in dish

On which desktop operating systems are Harmony Endpoint Clients supported?

A.

Windows, macOS, Linux and Unix

B.

Only Windows and macOS

C.

Windows Servers and Clients, macOS and Linux

D.

Windows Client, macOS and Linux

What happens to clients that fail to meet the requirements?

A.

They have unenforced protections

B.

They have encryption issues

C.

They do not receive FDE protections

D.

They receive incomplete protections

Endpoint Security Clients are applications installed on company-owned desktop and laptop computers which include the following:

A.

Endpoint security software Capabilities and a device agent which operates as a container for the Capabilities and communicates with the Endpoint Management Server

B.

GUI client that connects to the Endpoint Security Management Server to manage the policy and other configuration for Endpoints

C.

Endpoint Security software Capabilities and a GUI client to manage policies for all capabilities

D.

GUI client that connects to the local Endpoint Capability Software to manage the policy and all other configuration for that Endpoint only

What communication protocol does Harmony Endpoint management use to communicate with the management server?

A.

SIC

B.

CPCOM

C.

TCP

D.

UDP

One of the ways to install Endpoint Security clients is ‘Automatic Deployment’. Which of this is true for automatic deployment of Endpoint Security clients?

A.

Automatic deployment can be done on any Windows machine with Check Point SmartConsole first installed

B.

Automatic deployment can be done on any Windows 10 machine without any Check Point component pre-installed

C.

For automatic deployment to work, the client system must have SVN Foundation enabled in Windows 10 or downloaded and installed on other operating systems

D.

Automatic deployment first requires installation of the Initial Client package, which is exported and distributed manually

Does the Endpoint Client GUI provide automatic or manual prompting to protect removable storage media usage?

A.

Manual Only

B.

Either automatic or manual

C.

Automatic Only

D.

Neither automatic nor manual