What communication protocol does Harmony Endpoint management use to communicate with the management server?
A. SIC
B. CPCOM
C. TCP
D. UDP
In the POLICY Tab of the Harmony Endpoint portal for each software Capability (Threat Prevention, Data Protection etc.) rules can be created to protect endpoint machines. Choose the true statement.
A. The default rule is a global rule that only applies to Computers. Rules for Users must be added manually by the administrator.
B. There are no rules to start with and administrators must create rules in order to deploy the capability policies, actions and behavior.
C. There are only rules for the Harmony Endpoint Firewall Capability. All other Capabilities only include Actions.
D. The default rule is a global rule which applies to all users and computers in the organization.
Which Endpoint capability ensures that protected computers comply with your organization's requirements and allows you to assign different security levels according to the compliance state of the endpoint computer
A. Compliance Check
B. Capsule Cloud Compliance
C. Forensics and Anti-Ransomware
D. Full Disk Encryption
External Policy Servers are placed between the Endpoint clients and the Endpoint Security Management Server. How many Policy Servers are supported per environment?
A. From 1 to 25 Policy Servers are supported
B. From 1 to 15 Policy Servers are supported
C. From 1 to 20 Policy Servers are supported
D. From 1 to 5 Policy Servers are supported
What blades have to be enabled on the Management Server in order for the Endpoint Security Management Server to operate?
A. You can enable all gateway related blades.
B. The administrator has to enable compliance and Network Policy Management.
C. Logging & Status, SmartEvent Server, and SmartEvent Correlation unit must be enabled.
D. The SmartEndPoint super Node on the Management.
What is the default encryption algorithm in Full Disk Encryption tab under Advanced Settings?
A. AES-CBC 128 bit
B. AES-CBC 256 bit
C. XTS-AES 256 bit
D. XTS-AES 128 bit
If there are multiple EPS in an environment, what happens?
A. One Endpoint client automatically communicates with the server
B. Each Endpoint client automatically communicates with the EMS
C. Each Endpoint client does an analysis to find which EPS is "closest" and automatically communicates with that server.
D. Each Endpoint client automatically communicates with the SMS
What does pre-boot authentication disable?
A. Workarounds to computer security
B. Identity theft
C. Incorrect usernames
D. Weak passwords
Which User Roles are on the Endpoint Security Management Server for On-Premises servers?
A. Primary Administrator and Read-Only
B. Super Admin, Primary Administrator, User Admin, Read-Only
C. Admin and Read-Only
D. Super Admin, Read-Write All, Read-Only
What does the Data protection/General rule contain?
A. Actions that define user authentication settings only
B. Actions that define decryption settings for hard disks
C. Actions that restore encryption settings for hard disks and change user authentication settings
D. Actions that define port protection settings and encryption settings for hard disks and removable media
What is the command required to be run to start the Endpoint Web Interface for on-premises Harmony Endpoint Web Interface access?
A. start_web_mgmt - run in dish
B. start_web_mgmt - run in expert mode
C. web_mgmt_start - run in expert mode
D. web_mgmt_start - run in dish
What happens to clients that fail to meet the requirements?
A. They have unenforced protections
B. They have encryption issues
C. They do not receive FDE protections
D. They receive incomplete protections
Page 2 out of 7 Pages |
Previous |