Download Check Point Threat Prevention.156-727.77.CertKiller.2019-02-22.53q.vcex

Vendor: Checkpoint
Exam Code: 156-727.77
Exam Name: Check Point Threat Prevention
Date: Feb 22, 2019
File Size: 1 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
Which of these statements describes the Check Point IPS software blade?
  1. Blocks or limits usage of web applications
  2. A worldwide collaborative security network
  3. Prevents vulnerability exploits
  4. Controls access to web sites based on category
Correct answer: C
Question 2
Which of these statements describes the Check Point ThreatCloud?
  1. A worldwide collaborative security network
  2. Prevents vulnerability exploits
  3. Controls access to web sites based on category
  4. Blocks or limits usage of web applications
Correct answer: A
Question 3
Which TCP ports allow LDAP users to communicate with the Account Unit?
  1. 689 clear, or 336 encrypted
  2. 636 clear, or 389 encrypted
  3. 336 clear, or 689 encrypted
  4. 389 clear, or 636 encrypted
Correct answer: D
Question 4
Check Point Intrusion Prevention System (IPS) is available in two deployment methods, as a blade and also a dedicated appliance. What is the dedicated appliance called?
  1. InterSpect Appliance
  2. IPS-1 Sensor
  3. Smart-1 Appliance
  4. Power-1 Appliance
Correct answer: B
Question 5
What is the minimum amount of RAM needed for a Threat Prevention Appliance?
  1. 4 GB
  2. It depends on the number of software blades enabled.
  3. 2 GB with GAiA in 32-bit mode, 4 GB with GAiA in 64-bit mode
  4. 6 GB
Correct answer: A
Question 6
Which software blades are characteristic to a Threat Prevention Appliance?
  1. Anti-Virus, Anti-Bot, IPS, Identity Awareness
  2. Anti-Virus, Anti-Bot, IPS, URL Filtering, Identity Awareness
  3. Anti-Virus, Anti-Bot, IPS, Application Control, URL Filtering, Identity Awareness
  4. Anti-Virus, Anti-Bot, IPS, URL Filtering, Identity Awareness, SmartEvent
Correct answer: B
Question 7
Can the Anti-Bot software blade be enabled on a Secure Web Gateway as well?
  1. Yes, this is an optional blade for the Secure Web Gateway.
  2. No, Anti-Bot needs to be part of the Threat Prevention Appliance.
  3. Yes, it can be enabled if IPS is enabled as well.
  4. Yes, Anti-Bot is always enabled together with Identity Awareness.
Correct answer: A
Question 8
Which of these is a Check Point Firewall attribute?
  1. Malicious P2P application protection
  2. Buffer overflow prevention
  3. Worm injection blocking
  4. Granular access control
Correct answer: D
Question 9
What is the name of Check Point collaborative network that delivers real-time dynamic security intelligence to Check Point threat prevention blades?
  1. ThreatSpect
  2. ThreatWiki
  3. ThreatCloud
  4. ThreatEmulator
Correct answer: C
Question 10
What is the main purpose of the ThreatCloud?
  1. It is used in conjunction with IPS.
  2. This is the place where ThreatWiki fetches the actual information.
  3. It feeds security gateway software blades (i.e. Anti-Virus and Anti-Bot) with real-time security intelligence.
  4. It is a database used by SANS institute (formerly known as StormCenter).
Correct answer: C
Question 11
Which of these statements describes the Check Point IPS software blade?
  1. Blocks or limits usage of web applications
  2. A worldwide collaborative security network
  3. Prevents vulnerability exploits
  4. Controls access to web sites based on category
Correct answer: C
Question 12
Which of these statements describes the Check Point ThreatCloud?
  1. A worldwide collaborative security network
  2. Prevents vulnerability exploits
  3. Controls access to web sites based on category
  4. Blocks or limits usage of web applications
Correct answer: A
Question 13
Which TCP ports allow LDAP users to communicate with the Account Unit?
  1. 689 clear, or 336 encrypted
  2. 636 clear, or 389 encrypted
  3. 336 clear, or 689 encrypted
  4. 389 clear, or 636 encrypted
Correct answer: D
Question 14
Check Point Intrusion Prevention System (IPS) is available in two deployment methods, as a blade and also a dedicated appliance. What is the dedicated appliance called?
  1. InterSpect Appliance
  2. IPS-1 Sensor
  3. Smart-1 Appliance
  4. Power-1 Appliance
Correct answer: B
Question 15
What is the minimum amount of RAM needed for a Threat Prevention Appliance?
  1. 4 GB
  2. It depends on the number of software blades enabled.
  3. 2 GB with GAiA in 32-bit mode, 4 GB with GAiA in 64-bit mode
  4. 6 GB
Correct answer: A
Question 16
Which software blades are characteristic to a Threat Prevention Appliance?
  1. Anti-Virus, Anti-Bot, IPS, Identity Awareness
  2. Anti-Virus, Anti-Bot, IPS, URL Filtering, Identity Awareness
  3. Anti-Virus, Anti-Bot, IPS, Application Control, URL Filtering, Identity Awareness
  4. Anti-Virus, Anti-Bot, IPS, URL Filtering, Identity Awareness, SmartEvent
Correct answer: B
Question 17
Can the Anti-Bot software blade be enabled on a Secure Web Gateway as well?
  1. Yes, this is an optional blade for the Secure Web Gateway.
  2. No, Anti-Bot needs to be part of the Threat Prevention Appliance.
  3. Yes, it can be enabled if IPS is enabled as well.
  4. Yes, Anti-Bot is always enabled together with Identity Awareness.
Correct answer: A
Question 18
Which of these is a Check Point Firewall attribute?
  1. Malicious P2P application protection
  2. Buffer overflow prevention
  3. Worm injection blocking
  4. Granular access control
Correct answer: D
Question 19
What is the name of Check Point collaborative network that delivers real-time dynamic security intelligence to Check Point threat prevention blades?
  1. ThreatSpect
  2. ThreatWiki
  3. ThreatCloud
  4. ThreatEmulator
Correct answer: C
Question 20
What is the main purpose of the ThreatCloud?
  1. It is used in conjunction with IPS.
  2. This is the place where ThreatWiki fetches the actual information.
  3. It feeds security gateway software blades (i.e. Anti-Virus and Anti-Bot) with real-time security intelligence.
  4. It is a database used by SANS institute (formerly known as StormCenter).
Correct answer: C
Question 21
Which of these statements describes the Check Point IPS software blade?
  1. Blocks or limits usage of web applications
  2. A worldwide collaborative security network
  3. Prevents vulnerability exploits
  4. Controls access to web sites based on category
Correct answer: C
Question 22
Which of these statements describes the Check Point ThreatCloud?
  1. A worldwide collaborative security network
  2. Prevents vulnerability exploits
  3. Controls access to web sites based on category
  4. Blocks or limits usage of web applications
Correct answer: A
Question 23
Which TCP ports allow LDAP users to communicate with the Account Unit?
  1. 689 clear, or 336 encrypted
  2. 636 clear, or 389 encrypted
  3. 336 clear, or 689 encrypted
  4. 389 clear, or 636 encrypted
Correct answer: D
Question 24
Check Point Intrusion Prevention System (IPS) is available in two deployment methods, as a blade and also a dedicated appliance. What is the dedicated appliance called?
  1. InterSpect Appliance
  2. IPS-1 Sensor
  3. Smart-1 Appliance
  4. Power-1 Appliance
Correct answer: B
Question 25
What is the minimum amount of RAM needed for a Threat Prevention Appliance?
  1. 4 GB
  2. It depends on the number of software blades enabled.
  3. 2 GB with GAiA in 32-bit mode, 4 GB with GAiA in 64-bit mode
  4. 6 GB
Correct answer: A
Question 26
Which software blades are characteristic to a Threat Prevention Appliance?
  1. Anti-Virus, Anti-Bot, IPS, Identity Awareness
  2. Anti-Virus, Anti-Bot, IPS, URL Filtering, Identity Awareness
  3. Anti-Virus, Anti-Bot, IPS, Application Control, URL Filtering, Identity Awareness
  4. Anti-Virus, Anti-Bot, IPS, URL Filtering, Identity Awareness, SmartEvent
Correct answer: B
Question 27
Can the Anti-Bot software blade be enabled on a Secure Web Gateway as well?
  1. Yes, this is an optional blade for the Secure Web Gateway.
  2. No, Anti-Bot needs to be part of the Threat Prevention Appliance.
  3. Yes, it can be enabled if IPS is enabled as well.
  4. Yes, Anti-Bot is always enabled together with Identity Awareness.
Correct answer: A
Question 28
Which of these is a Check Point Firewall attribute?
  1. Malicious P2P application protection
  2. Buffer overflow prevention
  3. Worm injection blocking
  4. Granular access control
Correct answer: D
Question 29
What is the name of Check Point collaborative network that delivers real-time dynamic security intelligence to Check Point threat prevention blades?
  1. ThreatSpect
  2. ThreatWiki
  3. ThreatCloud
  4. ThreatEmulator
Correct answer: C
Question 30
What is the main purpose of the ThreatCloud?
  1. It is used in conjunction with IPS.
  2. This is the place where ThreatWiki fetches the actual information.
  3. It feeds security gateway software blades (i.e. Anti-Virus and Anti-Bot) with real-time security intelligence.
  4. It is a database used by SANS institute (formerly known as StormCenter).
Correct answer: C
Question 31
Which of these statements describes the Check Point IPS software blade?
  1. Blocks or limits usage of web applications
  2. A worldwide collaborative security network
  3. Prevents vulnerability exploits
  4. Controls access to web sites based on category
Correct answer: C
Question 32
Which of these statements describes the Check Point ThreatCloud?
  1. A worldwide collaborative security network
  2. Prevents vulnerability exploits
  3. Controls access to web sites based on category
  4. Blocks or limits usage of web applications
Correct answer: A
Question 33
Which TCP ports allow LDAP users to communicate with the Account Unit?
  1. 689 clear, or 336 encrypted
  2. 636 clear, or 389 encrypted
  3. 336 clear, or 689 encrypted
  4. 389 clear, or 636 encrypted
Correct answer: D
Question 34
Check Point Intrusion Prevention System (IPS) is available in two deployment methods, as a blade and also a dedicated appliance. What is the dedicated appliance called?
  1. InterSpect Appliance
  2. IPS-1 Sensor
  3. Smart-1 Appliance
  4. Power-1 Appliance
Correct answer: B
Question 35
What is the minimum amount of RAM needed for a Threat Prevention Appliance?
  1. 4 GB
  2. It depends on the number of software blades enabled.
  3. 2 GB with GAiA in 32-bit mode, 4 GB with GAiA in 64-bit mode
  4. 6 GB
Correct answer: A
Question 36
Which software blades are characteristic to a Threat Prevention Appliance?
  1. Anti-Virus, Anti-Bot, IPS, Identity Awareness
  2. Anti-Virus, Anti-Bot, IPS, URL Filtering, Identity Awareness
  3. Anti-Virus, Anti-Bot, IPS, Application Control, URL Filtering, Identity Awareness
  4. Anti-Virus, Anti-Bot, IPS, URL Filtering, Identity Awareness, SmartEvent
Correct answer: B
Question 37
Can the Anti-Bot software blade be enabled on a Secure Web Gateway as well?
  1. Yes, this is an optional blade for the Secure Web Gateway.
  2. No, Anti-Bot needs to be part of the Threat Prevention Appliance.
  3. Yes, it can be enabled if IPS is enabled as well.
  4. Yes, Anti-Bot is always enabled together with Identity Awareness.
Correct answer: A
Question 38
Which of these is a Check Point Firewall attribute?
  1. Malicious P2P application protection
  2. Buffer overflow prevention
  3. Worm injection blocking
  4. Granular access control
Correct answer: D
Question 39
What is the name of Check Point collaborative network that delivers real-time dynamic security intelligence to Check Point threat prevention blades?
  1. ThreatSpect
  2. ThreatWiki
  3. ThreatCloud
  4. ThreatEmulator
Correct answer: C
Question 40
What is the main purpose of the ThreatCloud?
  1. It is used in conjunction with IPS.
  2. This is the place where ThreatWiki fetches the actual information.
  3. It feeds security gateway software blades (i.e. Anti-Virus and Anti-Bot) with real-time security intelligence.
  4. It is a database used by SANS institute (formerly known as StormCenter).
Correct answer: C
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!