Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

156-536 Check Point Certified Harmony Endpoint Specialist - R81.20 (CCES) Questions and Answers

Questions 4

You're going to prepare a Deployment Scenario of an Endpoint Security Client on a Windows machine in an On-Prem environment. You choose one of two basic deployments - which is typical for a local deployment?

Options:

A.

Agent (Initial Client) package only

B.

Agent (Initial Client) and Software Blades packages

C.

Agent-less (no Client) and Software Blades packages

D.

Agent (free Client) package only

Buy Now
Questions 5

Is it possible to change the encryption algorithm on a fully encrypted disk, without need to decrypt it first? Is it possible to re-encrypt the disk on-the-fly?

Options:

A.

Changing the encryption algorithm is only supported on machines with legacy BIOS firmware. EFI or UEFI Firmware is not supported.

B.

Changing the encryption algorithm is supported on all machines, but you must first decrypt it, change encryption algorithm, and encrypt it again with new encryption algorithm.

C.

Changing the encryption algorithm is supported on all machines, no matter which firmware they have.

D.

Changing the encryption algorithm is only on machines that have EFI or IJEFI firmware. BIOS Firmware is not supported.

Buy Now
Questions 6

To enforce the FDE policy, the following requirement must be met?

Options:

A.

The client must obtain an FDE machine-based policy

B.

The client must obtain an FDE certificate

C.

Deployments must consist of at least one post-boot user

D.

A recovery file must be encrypted

Buy Now
Questions 7

In a Standalone installation, the EMS is installed on the same computer or a different one than the NMS?

Options:

A.

Same

B.

Half on one and half on another computer

C.

Both

D.

Different

Buy Now
Questions 8

How is the Kerberos keytab file created?

Options:

A.

Using Kerberos principals

B.

Using the AD server

C.

Using encryption keys

D.

With the ktpass tool

Buy Now
Questions 9

Which User Roles are on the Endpoint Security Management Server for On-Premises servers?

Options:

A.

Primary Administrator and Read-Only

B.

Super Admin, Primary Administrator, User Admin, Read-Only

C.

Admin and Read-Only

D.

Super Admin, Read-Write All, Read-Only

Buy Now
Questions 10

Before installing FDE on a client machine, what should administrators make sure of?

Options:

A.

That system volumes include at least 32 MB of continuous space

B.

That system volumes include at least 50 MB of continuous space

C.

That system volumes include at least 36 MB of continuous space

D.

That system volumes include at least 25 MB of continuous space

Buy Now
Questions 11

The Harmony Endpoint solution includes which three Data Security Software Capability protections?

Options:

A.

• Full Disk Encryption

• Media Encryption

• Anti-Malware

B.

• Passwords and Usernames

• Port Protection (MEPP)

• Security Questions

C.

• Media Encryption

• Media Decryption

• Remote Access VPN

D.

• Full Disk Encryption

• Media Encryption & Port Protection (MEPP)

• Remote Access VPN

Buy Now
Questions 12

Which command in a CLI session is used to check installed licenses on the Harmony Endpoint Management Server?

Options:

A.

cplic print -x

B.

show licenses all

C.

cplic add
D. cplic print +x

Buy Now
Questions 13

Media Encryption and Port Protection (MEPP) provide strong encryption for removable media, such as?

Options:

A.

USB drives, CD/DVDs, and SD cards, and for external ports

B.

Cables and Ethernet cords

C.

External ports only

D.

USB drives and CD/DVDs

Buy Now
Questions 14

How many digits are required in the FDE policy settings to enable a Very High-Security level for remote help on pre-boot?

Options:

A.

40 digits

B.

Maximum 30 digits

C.

24 digits

D.

Minimum 20 digits

Buy Now
Questions 15

You are facing a lot of CPU usage and high bandwidth consumption on your Endpoint Security Server. You check and verify that everything is working as it should be, but the performance is still very slow. What can you do to decrease your bandwidth and CPU usage?

Options:

A.

The management High Availability sizing is not correct. You have to purchase more servers and add them to the cluster.

B.

Your company's size is not large enough to have a valid need for Endpoint Solution.

C.

Your company needs more bandwidth. You have to increase your bandwidth by 300%.

D.

You can use some of your Endpoints as Super Nodes since super nodes reduce bandwidth as well as CPU usage.

Buy Now
Questions 16

You must make a decision of which FDE algorithm to be used by one of your clients who specializes in multimedia video editing. What algorithm will you choose?

Options:

A.

The implementation of a Secure VPN with very strong encryption will make your data invisible in cases of live internet transmission.

B.

In multimedia applications you do not need to implement any kind of Full Disk Encryption. You can use software like 7Zip in order to encrypt your data.

C.

Any kind of data is very important and the Full Disk Encryption technique must be used with the strongest secret key possible. Your client has to use strong encryption like XTS-AES 256 bit.

D.

Video processing is a high bandwidth application which utilizes a lot of HDD access time. You have to use a FDE algorithm with small secret key like XTS-AES 128 bit.

Buy Now
Questions 17

When is the heartbeat initiated?

Options:

A.

During the first sync

B.

After the last sync

C.

Before the first sync

D.

After the first sync

Buy Now
Questions 18

The Push Operation Wizard allows users to select which three topics for Push Operations?

Options:

A.

Anti-Malware, Forensics and Remediation, Agent Settings

B.

Anti-Virus, Remediation, Agent Settings

C.

Anti-Malware, Analysis, Agent Deployment

D.

Anti-Ransomware, Forensics and Analysis, Agent Configurations

Buy Now
Questions 19

What does Port Protection protect, and why?

Options:

A.

Activity on the ports of a client computer to help prevent data leakage

B.

Activity on the ports of a client computer to review logs

C.

Activity on the ports of a client computer to help unauthorized user access

D.

Activity on the ports of a client computer to monitor devices

Buy Now
Questions 20

How many security levels can you set when enabling Remote Help on pre-boot?

Options:

A.

Four levels - Low security, Medium security, High security, Very High security

B.

Two levels - Low and High security

C.

Three levels - Low security, Medium security, High security

D.

One and only level - enable or disable security

Buy Now
Questions 21

What are the general components of Data Protection?

Options:

A.

Data protection includes VPN and Firewall capabilities.

B.

Full Disk Encryption (FDE), Media Encryption, and Port Protection.

C.

It supports SmartCard Authentication and Pre-Boot encryption.

D.

Only OneCheck in Pre-Boot environment.

Buy Now
Questions 22

What do the machine's Endpoint Client GUI Overview page, Web Management, and debug logs show?

Options:

A.

The status of the client's FDE system setup only

B.

The deployment status of the client's policy download, user acquisition, FDE system setup, and encryption phases.

C.

The status of the client's policy downloads only

D.

The status of the client's encryption phases only

Buy Now
Questions 23

When can administrators prepare the client for the FDE software package installation and deployment?

Options:

A.

Once a client meets the maximum system requirements

B.

Once the policy is installed

C.

Once the client system volumes have 32 MB of space

D.

Once a client machine meets the minimum system requirements

Buy Now
Questions 24

How does Full Disk Encryption (FDE) add another layer of security?

Options:

A.

By offering media encryption

B.

By offering pre-boot protection

C.

By offering port protection

D.

By offering encryption

Buy Now
Questions 25

"Heartbeat" refers to what?

Options:

A.

A periodic client connection to the server

B.

A client connection that happens every 60 seconds

C.

A server connection that happens every 5 minutes

D.

A random server connection

Buy Now
Questions 26

When deploying a policy server, which is important?

Options:

A.

To have policies in place

B.

To configure the heartbeat interval and define the amount of time that the client is allowed to connect to the server

C.

To configure the EPS and define the amount of time that the client is allowed to connect to the SMS

D.

To install the heartbeat server first

Buy Now
Questions 27

Does the Endpoint Client GUI provide automatic or manual prompting to protect removable storage media usage?

Options:

A.

Manual Only

B.

Either automatic or manual

C.

Automatic Only

D.

Neither automatic nor manual

Buy Now
Questions 28

What blades have to be enabled on the Management Server for the Endpoint Security Management Server to operate?

Options:

A.

You can enable all gateway-related blades

B.

The administrator has to enable Compliance and Network Policy Management

C.

Logging & Status, SmartEvent Server, and SmartEvent Correlation unit must be enabled

D.

The SmartEndpoint super Node on the Management

Buy Now
Questions 29

What does FDE software combine to authorize access to data on desktop computers and laptops?

Options:

A.

Post-logon authentication and encryption

B.

OS boot protection with pre-boot authentication and encryption

C.

OS boot protection and post-boot authentication

D.

Decryption

Buy Now
Exam Code: 156-536
Exam Name: Check Point Certified Harmony Endpoint Specialist - R81.20 (CCES)
Last Update: Jun 18, 2025
Questions: 98

PDF + Testing Engine

$57.75  $164.99

Testing Engine

$43.75  $124.99
buy now 156-536 testing engine

PDF (Q&A)

$36.75  $104.99
buy now 156-536 pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 19 Jun 2025