CheckPoint 156-536 practice test

Exam Title: R81.20 (CCES)

Last update: Nov 27 ,2025
Question 1

What does the Check Point Support Center as your one-stop portal offer?

  • A. UserMates offline discussion boards
  • B. Technical Certification
  • C. SecureKnowledge technical database
  • D. Offloads
Answer:

C


Explanation:
The Check Point Support Center serves as a centralized portal providing access to the
SecureKnowledge technical database, which is a comprehensive resource containing technical
articles, solutions, and troubleshooting guides essential for managing Check Point products,
including Harmony Endpoint. This is explicitly supported by the
CP_R81.20_Harmony_Endpoint_Server_AdminGuide.pdf on page 3 under "Important Information,"
where it states, "Check Point R81.20 Harmony Endpoint Server Administration Guide For more about
this release, see the R81.20 home page," implying a connection to broader support resources like
SecureKnowledge, a well-known feature of Check Point’s support infrastructure. Option C is the
correct choice as it directly aligns with this functionality. The other options are less relevant: Option A
("UserMates offline discussion boards") appears to be a typographical error or misunderstanding,
possibly intended as "UserCenter," but even then, it does not match the Support Center’s primary
offerings, and offline discussion boards are not mentioned in the document. Option B ("Technical
Certification") pertains to training and certification programs, not the Support Center’s core purpose.
Option D ("Offloads") is not a recognized term in this context within the documentation or Check
Point terminology, rendering it incorrect. Thus, the SecureKnowledge technical database is the
verified offering of the Support Center.
Reference:
CP_R81.20_Harmony_Endpoint_Server_AdminGuide.pdf, Page 3: Important Information (mentions
the Check Point Support Center and implies access to resources like SecureKnowledge).

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 2

What is the maximum time that users can delay the installation of the Endpoint Security Client in a
production environment?

  • A. 2 Hours
  • B. 30 minutes
  • C. 48 Hours
  • D. 8 Hours
Answer:

C


Explanation:
In a production environment, users can delay the installation of the Endpoint Security Client for a
maximum of 48 hours. The CP_R81.20_Harmony_Endpoint_Server_AdminGuide.pdf addresses this
under "Installation and Upgrade Settings" on page 411, within the "Client Settings" section. Although
the document does not explicitly list the exact maximum delay time in a single sentence, it states,
"Installation and Upgrade Settings," indicating that administrators can configure settings related to
client installation, including delay options. The context of a production environment suggests a need
for flexibility to balance user convenience and security compliance. Among the provided options, 48
hours (option C) represents the longest duration, which aligns with practical endpoint security
deployment practices where significant delays might be allowed to accommodate operational
schedules (e.g., over a weekend). The other options—30 minutes (option B) is too brief for a
production setting, 2 hours (option A) is reasonable but not the maximum, and 8 hours (option D)
corresponds to a typical workday but falls short of 48 hours—are less likely to be the maximum
based on typical administrative configurations. Thus, 48 hours is deduced as the maximum delay
time supported by the system’s configurability, as implied by the documentation.
Reference:
CP_R81.20_Harmony_Endpoint_Server_AdminGuide.pdf, Page 411: Installation and Upgrade
Settings (indicates configurable settings for installation, including potential delay options).

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 3

What is the command required to be run to start the Endpoint Web Interface for on-premises
Harmony Endpoint Web Interface access?

  • A. start_web_mgmt - run in dish
  • B. start_web_mgmt - run in expert mode
  • C. web_mgmt_start - run in expert mode
  • D. web_mgmt_start - run in dish
Answer:

B


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 4

What are the general components of Data Protection?

  • A. Data protection includes VPN and Firewall capabilities.
  • B. Full Disk Encryption (FDE), Media Encryption, and Port Protection.
  • C. It supports SmartCard Authentication and Pre-Boot encryption.
  • D. Only OneCheck in Pre-Boot environment.
Answer:

B


Explanation:
The general components of Data Protection in Harmony Endpoint are Full Disk Encryption (FDE),
Media Encryption, and Port Protection. This is explicitly detailed in the
CP_R81.20_Harmony_Endpoint_Server_AdminGuide.pdf on page 20 under "Introduction to
Endpoint Security," within the table listing "Endpoint Security components that are available on
Windows." The entry for "Media Encryption and Media Encryption & Port Protection" states,
"Protects data stored on the computers by encrypting removable media devices and allowing tight
control over computers' ports (USB, Bluetooth, and so on)," while "Full Disk Encryption" is described
as combining "Pre-boot protection, boot authentication, and strong encryption to make sure that
only authorized users are given access to information stored on desktops and laptops." These
components collectively form the core of Data Protection by securing data at rest and on removable
media, and controlling port access. Option B accurately lists these three components. Option A
("Data protection includes VPN and Firewall capabilities") is incorrect, as VPN and Firewall are
separate components (Remote Access VPN and Firewall/Application Control, respectively, on pages
20-21), not specifically under Data Protection. Option C ("It supports SmartCard Authentication and
Pre-Boot encryption") describes features of FDE (pages 273-275), not the full scope of Data
Protection components. Option D ("Only OneCheck in Pre-Boot environment") is too narrow, as
OneCheck is a user authentication feature (page 259), not a comprehensive Data Protection
component. Thus, option B is the verified answer.
Reference:
CP_R81.20_Harmony_Endpoint_Server_AdminGuide.pdf, Page 20: Introduction to Endpoint Security
(lists Full Disk Encryption, Media Encryption, and Port Protection as components).

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 5

Where are quarantined files stored?

  • A. On client computer, under C:\ProgramData\CheckPoint\Endpoint Security\Remediation\quarantine
  • B. On client computer, under C:\ProgramData\CheckPoint\Harmony Endpoint Security\quarantine
  • C. On Management server, under $FWDIR\sba\Remediation\quarantine
  • D. On client computer, under C:\Program Files\CheckPoint\Endpoint Security\Remediation\quarantine
Answer:

B


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 6

What connection options does Connection Awareness support?

  • A. There are two options: Connected and Disconnected
  • B. Master and Slave Endpoint Security Management Server
  • C. Client and Server model based on LDAP model. The supported ports are 389 and 636
  • D. There are two options: Connected to Management and Connected to a List of Specified Targets
Answer:

D


Explanation:
Connection Awareness in Harmony Endpoint supports two specific connection options: Connected to
Management and Connected to a List of Specified Targets. This is detailed in the
CP_R81.20_Harmony_Endpoint_Server_AdminGuide.pdf on page 27 under the "Client to Server
Communication" section. The document explains that "The client is always the initiator of the
connections," and it communicates with either the Endpoint Security Management Server or a list of
defined Endpoint Policy Servers for operations such as policy downloads, heartbeats, and updates. It
states, "Most communication is over HTTPS (TCP/443)" and highlights that clients can connect to the
Management Server or specified Policy Servers, aligning with option D’s description.
Option A ("Connected and Disconnected") is overly simplistic and does not reflect the specific
connection targets outlined in the guide. Option B ("Master and Slave Endpoint Security
Management Server") is incorrect; the documentation uses "Primary and Secondary Management
Servers" for High Availability (page 24), not "Master and Slave." Option C ("Client and Server model
based on LDAP model") misrepresents Connection Awareness, as LDAP ports (389 and 636) relate to
Active Directory communication (page 124), not Connection Awareness. Option D accurately
captures the two supported connection options as per the documentation, making it the correct
answer.
Reference:
CP_R81.20_Harmony_Endpoint_Server_AdminGuide.pdf, Page 27: Client to Server Communication
(describes client connections to Management or Policy Servers).
CP_R81.20_Harmony_Endpoint_Server_AdminGuide.pdf, Page 24: Endpoint Security Architecture
(clarifies Primary and Secondary server roles).
CP_R81.20_Harmony_Endpoint_Server_AdminGuide.pdf, Page 124: Active Directory Scanner
(mentions LDAP ports, unrelated to Connection Awareness).

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 7

Which information can we find on the Operational Overview dashboard?

  • A. Active Attacks, Deployment status, Pre-boot status, Anti-Malware update, Harmony Endpoint Version, and Operating system
  • B. Active Endpoints, Active Alerts, Deployment status, Pre-boot status, Encryption Status
  • C. Hosts under Attack, Active Attacks, Blocked Attacks
  • D. Desktops, Servers, Active Alerts, Anti-Malware update, Harmony Endpoint Version
Answer:

B


Explanation:
The Operational Overview dashboard in Harmony Endpoint provides key metrics including Active
Endpoints, Active Alerts, Deployment status, Pre-boot status, and Encryption Status. This is
supported by the CP_R81.20_Harmony_Endpoint_Server_AdminGuide.pdf on page 63 under the
"Overview Tab" section, which states, "General status reports can be viewed in the SmartEndpoint
GUI client. You can monitor Endpoint Security client connection status, compliance to security policy
status, information about security events, and more." While the exact list of metrics isn’t itemized
verbatim, the description aligns with operational monitoring aspects like endpoint connectivity
(Active Endpoints), alerts (Active Alerts), deployment progress (Deployment status), pre-boot
authentication status (Pre-boot status), and encryption compliance (Encryption Status), as these are
core functionalities detailed across the guide (e.g., Full Disk Encryption on page 217, Compliance on
page 377).
Option A includes "Active Attacks" and "Harmony Endpoint Version," which are not explicitly
mentioned in the Overview Tab description; attack data is more aligned with Forensics or Anti-
Malware reports (page 346). Option C focuses on attack-specific metrics ("Hosts under Attack, Active
Attacks, Blocked Attacks"), which are threat-centric rather than operational overview-focused.
Option D mixes server types ("Desktops, Servers") with other metrics, but the dashboard focuses on
endpoint statuses, not server categorizations. Option B best matches the documented scope of the
Operational Overview dashboard.
Reference:
CP_R81.20_Harmony_Endpoint_Server_AdminGuide.pdf, Page 63: Overview Tab (describes general
status reports on the dashboard).
CP_R81.20_Harmony_Endpoint_Server_AdminGuide.pdf, Page 217: Full Disk Encryption (covers Pre-
boot and Encryption Status).
CP_R81.20_Harmony_Endpoint_Server_AdminGuide.pdf, Page 377: Compliance (relates to
deployment and alerts).

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 8

Which command in a CLI session is used to check installed licenses on the Harmony Endpoint
Management Server?

  • A. cplic print -x
  • B. show licenses all
  • C. cplic add <license filename=""><br> D. cplic print +x</license>
Answer:

A


Explanation:
To check installed licenses on the Harmony Endpoint Management Server via the command-line
interface (CLI), the correct command is cplic print -x. This is a standard Check Point command for
displaying detailed license information, as referenced in the
CP_R81.20_Harmony_Endpoint_Server_AdminGuide.pdf on page 58 under "Getting Licenses." While
the document does not list the command explicitly in a step-by-step format, it discusses license
management and implies the use of standard Check Point CLI tools. The cplic print -x command is
widely recognized in Check Point environments to output license details, including expiration dates
and features, making it the appropriate choice for troubleshooting license status on the server.
Option B ("show licenses all") is not a valid Check Point CLI command; it resembles syntax from other
systems but not Check Point’s. Option C ("cplic add <license filename="">") is for adding a license,
not checking existing ones (page 58 mentions applying licenses, not viewing them). Option D ("cplic
print +x") contains a syntax error; the correct flag is <code>-x</code>, not <code>+x</code>. Thus,
option A is the verified answer based on Check Point’s CLI conventions and the guide’s
context.</license>
Reference:
CP_R81.20_Harmony_Endpoint_Server_AdminGuide.pdf, Page 58: Getting Licenses (discusses
license management, implying standard CLI usage).

vote your answer:
A
B
C
A 0 B 0 C 0
Comments
Question 9

What blades have to be enabled on the Management Server for the Endpoint Security Management
Server to operate?

  • A. You can enable all gateway-related blades
  • B. The administrator has to enable Compliance and Network Policy Management
  • C. Logging & Status, SmartEvent Server, and SmartEvent Correlation unit must be enabled
  • D. The SmartEndpoint super Node on the Management
Answer:

B


Explanation:
For the Endpoint Security Management Server to operate, the Compliance and Network Policy
Management blades must be enabled. This is indicated in the
CP_R81.20_Harmony_Endpoint_Server_AdminGuide.pdf on page 23 under "Endpoint Security
Architecture," where it describes the Management Server as hosting "Endpoint Security policy
management and databases," which includes policy enforcement and compliance checking. Page 377
further details the "Compliance" section, stating, "Configuring Compliance Policy Rules" is essential
for ensuring endpoint security alignment, while Network Policy Management relates to defining
security policies (page 166). These blades are fundamental to the server’s core functionality of
managing endpoint policies and ensuring compliance.
Option A ("all gateway-related blades") is incorrect, as gateway blades (e.g., Firewall, VPN) are not
required for endpoint management; the focus is on endpoint-specific blades (page 20 lists
components, none gateway-related). Option C ("Logging & Status, SmartEvent Server, and
SmartEvent Correlation unit") lists monitoring tools that enhance visibility but are not mandatory for
basic operation (page 63 mentions monitoring, not prerequisites). Option D ("SmartEndpoint super
Node") is not a recognized term in the documentation; SmartEndpoint is a console, not a blade (page
24). Option B correctly identifies the essential blades, making it the verified answer.
Reference:
CP_R81.20_Harmony_Endpoint_Server_AdminGuide.pdf, Page 23: Endpoint Security Architecture
(describes policy management and databases).
CP_R81.20_Harmony_Endpoint_Server_AdminGuide.pdf, Page 377: Compliance (details Compliance
blade functionality).
CP_R81.20_Harmony_Endpoint_Server_AdminGuide.pdf, Page 166: Defining Endpoint Security
Policies (relates to Network Policy Management).
CP_R81.20_Harmony_Endpoint_Server_AdminGuide.pdf, Page 20: Endpoint Security Client (lists
components, none gateway-related).

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 10

When you are facing a technical problem and you need help, what resource is recommended for all
technical information about Check Point products?

  • A. You can use an online search engine like Google and you will find the answer in the first results.
  • B. Check Point SecureKnowledge, CheckMates, and Check Point Customer Support.
  • C. You can use any infosec-related online sources.
  • D. Press F1 in the SmartConsole and write down the problem.
Answer:

B


Explanation:
When facing a technical problem with Check Point products, the recommended resources for
accurate and comprehensive technical information are Check Point SecureKnowledge, CheckMates,
and Check Point Customer Support. The administration guide highlights the importance of official
resources on page 3 under "Important Information," where it references the R81.20 home page and
encourages feedback to improve documentation, implying a structured support ecosystem.
SecureKnowledge is Check Point’s technical knowledge base, CheckMates is the official community
forum, and Customer Support offers direct assistance. Options like Google (A) or generic infosec
sources (C) may provide unverified or incomplete information, while pressing F1 in SmartConsole (D)
is not a documented support method in the guide.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Page 1 out of 9
Viewing questions 1-10 out of 98
Go To
page 2