Download Check Point Threat Prevention.156-727.77.PracticeTest.2018-07-20.27q.vcex

Vendor: Checkpoint
Exam Code: 156-727.77
Exam Name: Check Point Threat Prevention
Date: Jul 20, 2018
File Size: 1 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
What is the name of Check Point collaborative network that delivers real-time dynamic security intelligence to Check Point threat prevention blades?
  1. ThreatSpect
  2. ThreatWiki
  3. ThreatCloud
  4. ThreatEmulator
Correct answer: C
Question 2
What is the main purpose of the ThreatCloud?
  1. It is used in conjunction with IPS.
  2. This is the place where ThreatWiki fetches the actual information.
  3. It feeds security gateway software blades (i.e. Anti-Virus and Anti-Bot) with real-time security intelligence.
  4. It is a database used by SANS institute (formerly known as StormCenter).
Correct answer: C
Question 3
Which of the following is information uploaded to ThreatCloud?
  1. Compromised Machine IP Addresses
  2. Malware Site IP Addresses
  3. Anticipated Attack Methods
  4. Sensitive Corporate Data
Correct answer: B
Question 4
Which of the following is information shared via ThreatCloud?
  1. Sensitive Corporate Data
  2. Bot and virus signatures
  3. Anticipated Attack Methods
  4. Compromised Machine IP Addresses
Correct answer: B
Question 5
Which of the following is information shared via ThreatCloud?
  1. Compromised Machine IP Addresses
  2. Anticipated Attack Methods
  3. Sensitive Corporate Data
  4. Address of command and control servers
Correct answer: D
Question 6
Sensitive corporate data is uploaded to ThreatCloud:
  1. When the administrator manually sends suspected traffic to ThreatCloud for inspection.
  2. Never
  3. When the administrator configures the sensor to be a SensorNET participant.
  4. After the bot attack has been confirmed.
Correct answer: B
Question 7
What is the name of the Check Point cloud-driven Knowledgebase?
  1. ThreatSpect
  2. ThreatCloud
  3. ThreatWiki
  4. ThreatEmulator
Correct answer: C
Question 8
What filters can be used in Check Point ThreatWiki (either via ThreatWiki.checkpoint.com or via ThreatPrevention tab in Dashboard)?
  1. Malware Name, Malware Type
  2. Categories, Risk, Release Date
  3. Risk, Malware Type, Release Date
  4. Categories, Tags, Risk
Correct answer: D
Question 9
IPS is primarily a __________-based engine.
  1. Signature
  2. Difference
  3. Action
  4. Anomaly
Correct answer: A
Question 10
SmartEvent has several components that work together to help track down security threats. What is the function of the Correlation Unit as one of those components in the architecture? The Correlation Unit:
  1. connects with the SmartEvent Client when generating reports.
  2. analyzes each log entry as it enters a log server, according to the Event Policy; when a threat pattern is identified, an event is forwarded to the SmartEvent Server.
  3. collects syslog data from third party devices and saves them to the database.
  4. correlates all the identified threats with the consolidation policy.
Correct answer: B
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!