Download Checkpoint.156-727.77.CertKiller.2019-02-22.53q.vcex

Download Exam

File Info

Exam Check Point Threat Prevention
Number 156-727.77
File Name Checkpoint.156-727.77.CertKiller.2019-02-22.53q.vcex
Size 1 MB
Posted Feb 22, 2019
Download Checkpoint.156-727.77.CertKiller.2019-02-22.53q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

Which of these statements describes the Check Point IPS software blade?


  1. Blocks or limits usage of web applications
  2. A worldwide collaborative security network
  3. Prevents vulnerability exploits
  4. Controls access to web sites based on category
Correct answer: C



Question 2

Which of these statements describes the Check Point ThreatCloud?


  1. A worldwide collaborative security network
  2. Prevents vulnerability exploits
  3. Controls access to web sites based on category
  4. Blocks or limits usage of web applications
Correct answer: A



Question 3

Which TCP ports allow LDAP users to communicate with the Account Unit?


  1. 689 clear, or 336 encrypted
  2. 636 clear, or 389 encrypted
  3. 336 clear, or 689 encrypted
  4. 389 clear, or 636 encrypted
Correct answer: D



Question 4

Check Point Intrusion Prevention System (IPS) is available in two deployment methods, as a blade and also a dedicated appliance. What is the dedicated appliance called?


  1. InterSpect Appliance
  2. IPS-1 Sensor
  3. Smart-1 Appliance
  4. Power-1 Appliance
Correct answer: B



Question 5

What is the minimum amount of RAM needed for a Threat Prevention Appliance?


  1. 4 GB
  2. It depends on the number of software blades enabled.
  3. 2 GB with GAiA in 32-bit mode, 4 GB with GAiA in 64-bit mode
  4. 6 GB
Correct answer: A



Question 6

Which software blades are characteristic to a Threat Prevention Appliance?


  1. Anti-Virus, Anti-Bot, IPS, Identity Awareness
  2. Anti-Virus, Anti-Bot, IPS, URL Filtering, Identity Awareness
  3. Anti-Virus, Anti-Bot, IPS, Application Control, URL Filtering, Identity Awareness
  4. Anti-Virus, Anti-Bot, IPS, URL Filtering, Identity Awareness, SmartEvent
Correct answer: B



Question 7

Can the Anti-Bot software blade be enabled on a Secure Web Gateway as well?


  1. Yes, this is an optional blade for the Secure Web Gateway.
  2. No, Anti-Bot needs to be part of the Threat Prevention Appliance.
  3. Yes, it can be enabled if IPS is enabled as well.
  4. Yes, Anti-Bot is always enabled together with Identity Awareness.
Correct answer: A



Question 8

Which of these is a Check Point Firewall attribute?


  1. Malicious P2P application protection
  2. Buffer overflow prevention
  3. Worm injection blocking
  4. Granular access control
Correct answer: D



Question 9

What is the name of Check Point collaborative network that delivers real-time dynamic security intelligence to Check Point threat prevention blades?


  1. ThreatSpect
  2. ThreatWiki
  3. ThreatCloud
  4. ThreatEmulator
Correct answer: C



Question 10

What is the main purpose of the ThreatCloud?


  1. It is used in conjunction with IPS.
  2. This is the place where ThreatWiki fetches the actual information.
  3. It feeds security gateway software blades (i.e. Anti-Virus and Anti-Bot) with real-time security intelligence.
  4. It is a database used by SANS institute (formerly known as StormCenter).
Correct answer: C



Question 11

Which of these statements describes the Check Point IPS software blade?


  1. Blocks or limits usage of web applications
  2. A worldwide collaborative security network
  3. Prevents vulnerability exploits
  4. Controls access to web sites based on category
Correct answer: C



Question 12

Which of these statements describes the Check Point ThreatCloud?


  1. A worldwide collaborative security network
  2. Prevents vulnerability exploits
  3. Controls access to web sites based on category
  4. Blocks or limits usage of web applications
Correct answer: A



Question 13

Which TCP ports allow LDAP users to communicate with the Account Unit?


  1. 689 clear, or 336 encrypted
  2. 636 clear, or 389 encrypted
  3. 336 clear, or 689 encrypted
  4. 389 clear, or 636 encrypted
Correct answer: D



Question 14

Check Point Intrusion Prevention System (IPS) is available in two deployment methods, as a blade and also a dedicated appliance. What is the dedicated appliance called?


  1. InterSpect Appliance
  2. IPS-1 Sensor
  3. Smart-1 Appliance
  4. Power-1 Appliance
Correct answer: B



Question 15

What is the minimum amount of RAM needed for a Threat Prevention Appliance?


  1. 4 GB
  2. It depends on the number of software blades enabled.
  3. 2 GB with GAiA in 32-bit mode, 4 GB with GAiA in 64-bit mode
  4. 6 GB
Correct answer: A



Question 16

Which software blades are characteristic to a Threat Prevention Appliance?


  1. Anti-Virus, Anti-Bot, IPS, Identity Awareness
  2. Anti-Virus, Anti-Bot, IPS, URL Filtering, Identity Awareness
  3. Anti-Virus, Anti-Bot, IPS, Application Control, URL Filtering, Identity Awareness
  4. Anti-Virus, Anti-Bot, IPS, URL Filtering, Identity Awareness, SmartEvent
Correct answer: B



Question 17

Can the Anti-Bot software blade be enabled on a Secure Web Gateway as well?


  1. Yes, this is an optional blade for the Secure Web Gateway.
  2. No, Anti-Bot needs to be part of the Threat Prevention Appliance.
  3. Yes, it can be enabled if IPS is enabled as well.
  4. Yes, Anti-Bot is always enabled together with Identity Awareness.
Correct answer: A



Question 18

Which of these is a Check Point Firewall attribute?


  1. Malicious P2P application protection
  2. Buffer overflow prevention
  3. Worm injection blocking
  4. Granular access control
Correct answer: D



Question 19

What is the name of Check Point collaborative network that delivers real-time dynamic security intelligence to Check Point threat prevention blades?


  1. ThreatSpect
  2. ThreatWiki
  3. ThreatCloud
  4. ThreatEmulator
Correct answer: C



Question 20

What is the main purpose of the ThreatCloud?


  1. It is used in conjunction with IPS.
  2. This is the place where ThreatWiki fetches the actual information.
  3. It feeds security gateway software blades (i.e. Anti-Virus and Anti-Bot) with real-time security intelligence.
  4. It is a database used by SANS institute (formerly known as StormCenter).
Correct answer: C



Question 21

Which of these statements describes the Check Point IPS software blade?


  1. Blocks or limits usage of web applications
  2. A worldwide collaborative security network
  3. Prevents vulnerability exploits
  4. Controls access to web sites based on category
Correct answer: C



Question 22

Which of these statements describes the Check Point ThreatCloud?


  1. A worldwide collaborative security network
  2. Prevents vulnerability exploits
  3. Controls access to web sites based on category
  4. Blocks or limits usage of web applications
Correct answer: A



Question 23

Which TCP ports allow LDAP users to communicate with the Account Unit?


  1. 689 clear, or 336 encrypted
  2. 636 clear, or 389 encrypted
  3. 336 clear, or 689 encrypted
  4. 389 clear, or 636 encrypted
Correct answer: D



Question 24

Check Point Intrusion Prevention System (IPS) is available in two deployment methods, as a blade and also a dedicated appliance. What is the dedicated appliance called?


  1. InterSpect Appliance
  2. IPS-1 Sensor
  3. Smart-1 Appliance
  4. Power-1 Appliance
Correct answer: B



Question 25

What is the minimum amount of RAM needed for a Threat Prevention Appliance?


  1. 4 GB
  2. It depends on the number of software blades enabled.
  3. 2 GB with GAiA in 32-bit mode, 4 GB with GAiA in 64-bit mode
  4. 6 GB
Correct answer: A



Question 26

Which software blades are characteristic to a Threat Prevention Appliance?


  1. Anti-Virus, Anti-Bot, IPS, Identity Awareness
  2. Anti-Virus, Anti-Bot, IPS, URL Filtering, Identity Awareness
  3. Anti-Virus, Anti-Bot, IPS, Application Control, URL Filtering, Identity Awareness
  4. Anti-Virus, Anti-Bot, IPS, URL Filtering, Identity Awareness, SmartEvent
Correct answer: B



Question 27

Can the Anti-Bot software blade be enabled on a Secure Web Gateway as well?


  1. Yes, this is an optional blade for the Secure Web Gateway.
  2. No, Anti-Bot needs to be part of the Threat Prevention Appliance.
  3. Yes, it can be enabled if IPS is enabled as well.
  4. Yes, Anti-Bot is always enabled together with Identity Awareness.
Correct answer: A



Question 28

Which of these is a Check Point Firewall attribute?


  1. Malicious P2P application protection
  2. Buffer overflow prevention
  3. Worm injection blocking
  4. Granular access control
Correct answer: D



Question 29

What is the name of Check Point collaborative network that delivers real-time dynamic security intelligence to Check Point threat prevention blades?


  1. ThreatSpect
  2. ThreatWiki
  3. ThreatCloud
  4. ThreatEmulator
Correct answer: C



Question 30

What is the main purpose of the ThreatCloud?


  1. It is used in conjunction with IPS.
  2. This is the place where ThreatWiki fetches the actual information.
  3. It feeds security gateway software blades (i.e. Anti-Virus and Anti-Bot) with real-time security intelligence.
  4. It is a database used by SANS institute (formerly known as StormCenter).
Correct answer: C



Question 31

Which of these statements describes the Check Point IPS software blade?


  1. Blocks or limits usage of web applications
  2. A worldwide collaborative security network
  3. Prevents vulnerability exploits
  4. Controls access to web sites based on category
Correct answer: C



Question 32

Which of these statements describes the Check Point ThreatCloud?


  1. A worldwide collaborative security network
  2. Prevents vulnerability exploits
  3. Controls access to web sites based on category
  4. Blocks or limits usage of web applications
Correct answer: A



Question 33

Which TCP ports allow LDAP users to communicate with the Account Unit?


  1. 689 clear, or 336 encrypted
  2. 636 clear, or 389 encrypted
  3. 336 clear, or 689 encrypted
  4. 389 clear, or 636 encrypted
Correct answer: D



Question 34

Check Point Intrusion Prevention System (IPS) is available in two deployment methods, as a blade and also a dedicated appliance. What is the dedicated appliance called?


  1. InterSpect Appliance
  2. IPS-1 Sensor
  3. Smart-1 Appliance
  4. Power-1 Appliance
Correct answer: B



Question 35

What is the minimum amount of RAM needed for a Threat Prevention Appliance?


  1. 4 GB
  2. It depends on the number of software blades enabled.
  3. 2 GB with GAiA in 32-bit mode, 4 GB with GAiA in 64-bit mode
  4. 6 GB
Correct answer: A



Question 36

Which software blades are characteristic to a Threat Prevention Appliance?


  1. Anti-Virus, Anti-Bot, IPS, Identity Awareness
  2. Anti-Virus, Anti-Bot, IPS, URL Filtering, Identity Awareness
  3. Anti-Virus, Anti-Bot, IPS, Application Control, URL Filtering, Identity Awareness
  4. Anti-Virus, Anti-Bot, IPS, URL Filtering, Identity Awareness, SmartEvent
Correct answer: B



Question 37

Can the Anti-Bot software blade be enabled on a Secure Web Gateway as well?


  1. Yes, this is an optional blade for the Secure Web Gateway.
  2. No, Anti-Bot needs to be part of the Threat Prevention Appliance.
  3. Yes, it can be enabled if IPS is enabled as well.
  4. Yes, Anti-Bot is always enabled together with Identity Awareness.
Correct answer: A



Question 38

Which of these is a Check Point Firewall attribute?


  1. Malicious P2P application protection
  2. Buffer overflow prevention
  3. Worm injection blocking
  4. Granular access control
Correct answer: D



Question 39

What is the name of Check Point collaborative network that delivers real-time dynamic security intelligence to Check Point threat prevention blades?


  1. ThreatSpect
  2. ThreatWiki
  3. ThreatCloud
  4. ThreatEmulator
Correct answer: C



Question 40

What is the main purpose of the ThreatCloud?


  1. It is used in conjunction with IPS.
  2. This is the place where ThreatWiki fetches the actual information.
  3. It feeds security gateway software blades (i.e. Anti-Virus and Anti-Bot) with real-time security intelligence.
  4. It is a database used by SANS institute (formerly known as StormCenter).
Correct answer: C









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files