Download CheckPoint.testking.156-727.77.2018-07-03.1e.30q.vcex

Download Dump

File Info

Exam Check Point Threat Prevention
Number 156-727.77
File Name CheckPoint.testking.156-727.77.2018-07-03.1e.30q.vcex
Size 1.12 Mb
Posted July 03, 2018
Downloaded 5

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.


With discount: 20%

Demo Questions

Question 1
What is the name of the Check Point cloud-driven Knowledgebase?

  • A: ThreatSpect
  • B: ThreatCloud
  • C: ThreatWiki
  • D: ThreatEmulator

Question 2
What filters can be used in Check Point ThreatWiki (either via or via ThreatPrevention tab in Dashboard)?

  • A: Malware Name, Malware Type
  • B: Categories, Risk, Release Date
  • C: Risk, Malware Type, Release Date
  • D: Categories, Tags, Risk

Question 3
Which of the following is a searchable database of all known threats detected by sensors around the world?

  • A: ThreatCloud
  • B: ThreatWiki
  • C: ThreatSpect
  • D: SmartLog

Question 4
Check Point’s IPS blade provides two pre-defined profiles. Which of the following definitions are correct?

  • A: Default_Protection: Provides excellent performance with a sufficient level of protection. 
    Recommended_Protection: Provides the best security with a sufficient level of performance
  • B: Default_Protection: Provides tracking only for troubleshooting purposes and evaluation prior to full implementation. 
    Recommended_Protection: Provides excellent performance with a sufficient level of protection.
  • C: Default_Protection: Provides the best security with a sufficient level of performance. 
    Recommended_Protection: Provides excellent performance with a sufficient level of protection.
  • D: Default_Protection: Is an uneditable profile that prevents all IPS related traffic. 
    Recommended_Protection: Provides excellent performance, flexibility to customize protections and actions, with a sufficient level of protection.

Question 5
When adding IPS to a gateway, which profile will be set?

  • A: Default_Protection, but with all actions set to “Detect only”
  • B: Default_Protection, but with all actions set to “Prevent”
  • C: Default_Protection
  • D: Recommended_Protection

Question 6
Check Point Signature teams are constantly monitoring the threat space.

  • A: True, twenty four hours a day, everyday
  • B: True, except for major holidays
  • C: True, from Sunday through Thursday
  • D: False

Question 7
IPS is primarily a __________-based engine.

  • A: Signature
  • B: Difference
  • C: Action
  • D: Anomaly

Question 8
IPS can assist in the discovery of unknown buffer overflow attacks without any pre-defined signatures.

  • A: False, only the Threat Emulator blade can discover unknown attacks.
  • B: True, if Zero-Day vulnerability is enabled.
  • C: False, IPS needs predefined signatures for all functions.
  • D: True, if Malicious Code Protector is enabled in IPS.

Question 9
What advantage does the Recommended_Profile provide over the Default_Protection profile?

  • A: Reduced server load
  • B: Accelerated throughput
  • C: Advanced reporting options
  • D: Higher security posture

Question 10
SmartEvent has several components that work together to help track down security threats. What is the function of the Correlation Unit as one of those components in the architecture? The Correlation Unit:

  • A: connects with the SmartEvent Client when generating reports.
  • B: analyzes each log entry as it enters a log server, according to the Event Policy; when a threat pattern is identified, an event is forwarded to the SmartEvent Server.
  • C: collects syslog data from third party devices and saves them to the database.
  • D: correlates all the identified threats with the consolidation policy.



You can buy ProfExam with a 20% discount..

Get Now!


Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen


Use VCE Exam Simulator to open VCE files