Certbus > CheckPoint > CheckPoint Certification > 156-727.77 > 156-727.77 Online Practice Questions and Answers

156-727.77 Online Practice Questions and Answers

Questions 4

Which of these statements describes the Check Point ThreatCloud?

A. A worldwide collaborative security network

B. Prevents vulnerability exploits

C. Controls access to web sites based on category

D. Blocks or limits usage of web applications

Browse 53 Q&As
Questions 5

What is the name of Check Point collaborative network that delivers real-time dynamic security intelligence to Check Point threat prevention blades?

A. ThreatSpect

B. ThreatWiki

C. ThreatCloud

D. ThreatEmulator

Browse 53 Q&As
Questions 6

Which of the following is information shared via ThreatCloud?

A. Sensitive Corporate Data

B. Bot and virus signatures

C. Anticipated Attack Methods

D. Compromised Machine IP Addresses

Browse 53 Q&As
Questions 7

Which of the following is information shared via ThreatCloud?

A. Compromised Machine IP Addresses

B. Anticipated Attack Methods

C. Sensitive Corporate Data

D. Address of command and control servers

Browse 53 Q&As
Questions 8

What is the name of the Check Point cloud-driven Knowledgebase?

A. ThreatSpect

B. ThreatCloud

C. ThreatWiki

D. ThreatEmulator

Browse 53 Q&As
Questions 9

Check Point's IPS blade provides two pre-defined profiles. Which of the following definitions are correct?

A. Default_Protection: Provides excellent performance with a sufficient level of protection. Recommended_Protection: Provides the best security with a sufficient level of performance

B. Default_Protection: Provides tracking only for troubleshooting purposes and evaluation prior to full implementation. Recommended_Protection: Provides excellent performance with a sufficient level of protection.

C. Default_Protection: Provides the best security with a sufficient level of performance. Recommended_Protection: Provides excellent performance with a sufficient level of protection.

D. Default_Protection: Is an uneditable profile that prevents all IPS related traffic. Recommended_Protection: Provides excellent performance, flexibility to customize protections and actions, with a sufficient level of protection.

Browse 53 Q&As
Questions 10

When adding IPS to a gateway, which profile will be set?

A. Default_Protection, but with all actions set to "Detect only"

B. Default_Protection, but with all actions set to "Prevent"

C. Default_Protection

D. Recommended_Protection

Browse 53 Q&As
Questions 11

Check Point Signature teams are constantly monitoring the threat space.

A. True, twenty four hours a day, everyday

B. True, except for major holidays

C. True, from Sunday through Thursday

D. False

Browse 53 Q&As
Questions 12

IPS can assist in the discovery of unknown buffer overflow attacks without any pre-defined signatures.

A. False, only the Threat Emulator blade can discover unknown attacks.

B. True, if Zero-Day vulnerability is enabled.

C. False, IPS needs predefined signatures for all functions.

D. True, if Malicious Code Protector is enabled in IPS.

Browse 53 Q&As
Questions 13

John is troubleshooting a dropped traffic issue. Looking in SmartViewTracker, he cannot find anything related to it. What CLI command might help him in this situation where he suspects a possible problem with IPS?

A. All of the information is visible in SmartViewTracker without additional commands.

B. fw ctl pstat

C. fw logexport ¦ grep drop

D. fw ctl zdebug drop

Browse 53 Q&As
Questions 14

Order the steps to bypass the IPS for specific protection:

a.

Open the SmartDashboard

b.

Find the protection you want to bypass

c.

Add the exception for this specific protection

d.

Go to Network Exception tab

e.

Click New.

f.

Go to Protections view

g.

Install Security policy

h.

Go to IPS tab

A.

a, g, h, f, e, c, b, d

B.

a, d, f, h, e, c, b, g

C.

a, h, f, b, d, e, c, g

D.

a, f, h, c, e, d, b, g

Browse 53 Q&As
Questions 15

The Threat Prevention software blade:

A. Is configured in one unified policy for Anti-Bot and Anti-virus functions and uses the same threat repository.

B. Can only be deployed as part of SensorNET.

C. Is a free function that does not require additional licensing.

D. Can only be deployed on a Security Gateway running GAiA.

Browse 53 Q&As
Questions 16

Which of the following statements regarding the threat prevention database is NOT correct?

A. The Security management server connects to the internet to get Malware Database updates.

B. By default, updates run on the security gateway every two hours.

C. The malware database only updates if you have a valid Anti-Bot/ or Anti-Virus contract.

D. The security gateway contains a local cache of the malware requests.

Browse 53 Q&As
Questions 17

What is the most common way a computer can become infected with a bot?

A. Malvertising

B. Users accessing malicious web sites

C. Adobe file vulnerabilities

D. Microsoft file vulnerabilities

Browse 53 Q&As
Questions 18

Which of the following are valid Boolean search terms that can be used in custom SmartLog queries?

A. And, or, with

B. And, or, not

C. None, Boolean search terms cannot be used in SmartLog.

D. And, or, not, with

Browse 53 Q&As
Exam Code: 156-727.77
Exam Name: Threat Prevention
Last Update: Apr 15, 2024
Questions: 53 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99