Download Checkpoint.156-727.77.PracticeTest.2018-07-20.27q.vcex

Download Exam

File Info

Exam Check Point Threat Prevention
Number 156-727.77
File Name Checkpoint.156-727.77.PracticeTest.2018-07-20.27q.vcex
Size 1 MB
Posted Jul 20, 2018
Download Checkpoint.156-727.77.PracticeTest.2018-07-20.27q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

What is the name of Check Point collaborative network that delivers real-time dynamic security intelligence to Check Point threat prevention blades?


  1. ThreatSpect
  2. ThreatWiki
  3. ThreatCloud
  4. ThreatEmulator
Correct answer: C



Question 2

What is the main purpose of the ThreatCloud?


  1. It is used in conjunction with IPS.
  2. This is the place where ThreatWiki fetches the actual information.
  3. It feeds security gateway software blades (i.e. Anti-Virus and Anti-Bot) with real-time security intelligence.
  4. It is a database used by SANS institute (formerly known as StormCenter).
Correct answer: C



Question 3

Which of the following is information uploaded to ThreatCloud?


  1. Compromised Machine IP Addresses
  2. Malware Site IP Addresses
  3. Anticipated Attack Methods
  4. Sensitive Corporate Data
Correct answer: B



Question 4

Which of the following is information shared via ThreatCloud?


  1. Sensitive Corporate Data
  2. Bot and virus signatures
  3. Anticipated Attack Methods
  4. Compromised Machine IP Addresses
Correct answer: B



Question 5

Which of the following is information shared via ThreatCloud?


  1. Compromised Machine IP Addresses
  2. Anticipated Attack Methods
  3. Sensitive Corporate Data
  4. Address of command and control servers
Correct answer: D



Question 6

Sensitive corporate data is uploaded to ThreatCloud:


  1. When the administrator manually sends suspected traffic to ThreatCloud for inspection.
  2. Never
  3. When the administrator configures the sensor to be a SensorNET participant.
  4. After the bot attack has been confirmed.
Correct answer: B



Question 7

What is the name of the Check Point cloud-driven Knowledgebase?


  1. ThreatSpect
  2. ThreatCloud
  3. ThreatWiki
  4. ThreatEmulator
Correct answer: C



Question 8

What filters can be used in Check Point ThreatWiki (either via ThreatWiki.checkpoint.com or via ThreatPrevention tab in Dashboard)?


  1. Malware Name, Malware Type
  2. Categories, Risk, Release Date
  3. Risk, Malware Type, Release Date
  4. Categories, Tags, Risk
Correct answer: D



Question 9

IPS is primarily a __________-based engine.


  1. Signature
  2. Difference
  3. Action
  4. Anomaly
Correct answer: A



Question 10

SmartEvent has several components that work together to help track down security threats. What is the function of the Correlation Unit as one of those components in the architecture? The Correlation Unit:


  1. connects with the SmartEvent Client when generating reports.
  2. analyzes each log entry as it enters a log server, according to the Event Policy; when a threat pattern is identified, an event is forwarded to the SmartEvent Server.
  3. collects syslog data from third party devices and saves them to the database.
  4. correlates all the identified threats with the consolidation policy.
Correct answer: B









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files