Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

Full Disk Encryption (FDE) protects data at rest stored on_________.

A.

RAM Drive

B.

SMB Share

C.

NFS Share

D.

Hard Drive

Full Access
Question # 5

What is default Agent Uninstall Password, which protect client from unauthorized removal?

A.

Secret

B.

Chkp1234

C.

secret

D.

RemoveMe

Full Access
Question # 6

The Remote Help tool can be used to assist users in password recovery. What type of assistance does this tool provide

A.

The Remote Help only provides procedural information and FAQs about the Endpoint Security Client including procedure to reset password

B.

The Remote Help tool provides

a) User Logon Pre-boot Remote Help

b) Media Encryption Remote Help

C.

The Remote Help tool provides

a) Link to the secret location of encrypted password file

b) Key to decrypt the password file

D.

The Remote Help tool unlocks admin accounts on SmartEndpoint

Full Access
Question # 7

What does the Kerberos key tab file contain?

A.

Pairs of authentication settings and un-authentication settings

B.

Pairs of encryption and decryption keys

C.

Pairs of Kerberos principals and encryption keys

D.

Pairs of ktpass tools

Full Access
Question # 8

On which search engines/web sites is the Safe Search feature supported in Harmony Endpoint?

A.

Google. Bing, Yahoo! by default, and extra support for Baidu, Yandex, Lycos and Excite if the Harmony Endpoint Management is deployed in Cloud

B.

Google, Bing, and Yahoo!

C.

Google and Bing if the Harmony Endpoint Management is On-Premises deployment

D.

Google, Yahoo! and OneSearch

Full Access
Question # 9

What information does the Endpoint Client provide end users?

A.

Overview summary of all machines and their status.

B.

Overview summary of the protections deployed on the machines and the status of each protection.

C.

Overview summary of security breaches.

D.

Overview summary of traffic logs.

Full Access
Question # 10

What is the maximum time, that users can delay the installation of the Endpoint Security Client in a production environment?

A.

2 Hours

B.

30 minutes

C.

48 Hours

D.

8 Hours

Full Access
Question # 11

As an Endpoint Administrator you are facing with some errors related to AD Strong Authentication in Endpoint Management server. Where is the right place to look when you are troubleshooting these issues?

A.

$FWDIR/log/Authentication.log

B.

$FWDIR/logs/Auth.log

C.

$UEPMDIR/logs/Authentication.log

D.

$UEMPDlR/log/Authentication.elg

Full Access
Question # 12

default, an FDE Action does what?

A.

Rebuilds the hard drive

B.

Decrypts all visible disk volumes

C.

Encrypts all visible disk volumes

D.

Re-defines all visible disk volumes

Full Access
Question # 13

What communication protocol does Harmony Endpoint management use to communicate with the management server?

A.

SIC

B.

CPCOM

C.

TCP

D.

UDP

Full Access
Question # 14

In the POLICY Tab of the Harmony Endpoint portal for each software Capability (Threat Prevention, Data Protection etc.) rules can be created to protect endpoint machines. Choose the true statement.

A.

The default rule is a global rule that only applies to Computers. Rules for Users must be added manually by the administrator.

B.

There are no rules to start with and administrators must create rules in order to deploy the capability policies, actions and behavior.

C.

There are only rules for the Harmony Endpoint Firewall Capability. All other Capabilities only include Actions.

D.

The default rule is a global rule which applies to all users and computers in the organization.

Full Access
Question # 15

Which Endpoint capability ensures that protected computers comply with your organization's requirements and allows you to assign different security levels according to the compliance state of the endpoint computer

A.

Compliance Check

B.

Capsule Cloud Compliance

C.

Forensics and Anti-Ransomware

D.

Full Disk Encryption

Full Access
Question # 16

The Harmony Endpoint solution includes which three Data Security Software Capability protections?

A.

• Full Disk Encryption

• Media Encryption

• Anti-Malware

B.

• Passwords and Usernames

• Port Protection (MEPP)

• Security Questions

C.

• Media Encryption

• Media Decryption

• Remote Access VPN

D.

• Full Disk Encryption

• Media Encryption & Port Protection (MEPP)

• Remote Access VPN

Full Access
Question # 17

External Policy Servers are placed between the Endpoint clients and the Endpoint Security Management Server. How many Policy Servers are supported per environment?

A.

From 1 to 25 Policy Servers are supported

B.

From 1 to 15 Policy Servers are supported

C.

From 1 to 20 Policy Servers are supported

D.

From 1 to 5 Policy Servers are supported

Full Access
Question # 18

What blades have to be enabled on the Management Server in order for the Endpoint Security Management Server to operate?

A.

You can enable all gateway related blades.

B.

The administrator has to enable compliance and Network Policy Management.

C.

Logging & Status, SmartEvent Server, and SmartEvent Correlation unit must be enabled.

D.

The SmartEndPoint super Node on the Management.

Full Access
Question # 19

What is the default encryption algorithm in Full Disk Encryption tab under Advanced Settings?

A.

AES-CBC 128 bit

B.

AES-CBC 256 bit

C.

XTS-AES 256 bit

D.

XTS-AES 128 bit

Full Access
Question # 20

If there are multiple EPS in an environment, what happens?

A.

One Endpoint client automatically communicates with the server

B.

Each Endpoint client automatically communicates with the EMS

C.

Each Endpoint client does an analysis to find which EPS is "closest" and automatically communicates with that server.

D.

Each Endpoint client automatically communicates with the SMS

Full Access
Question # 21

What does pre-boot authentication disable?

A.

Workarounds to computer security

B.

Identity theft

C.

Incorrect usernames

D.

Weak passwords

Full Access
Question # 22

External Policy Servers are placed between the Endpoint clients and the Endpoint Security Management Server. What benefit does the External Endpoint Policy Server bring?

A.

Cluster and Delta requests

B.

Heartbeat and synchronization requests

C.

Test packet and delta requests

D.

Polling beat and delta requests

Full Access