Because of the skilled design connected with each Check Point software programs and people who keep some sort of Check Point certification, it contributes greatly put together standing and receptive interaction when using the ending customers which you program. You may also become more of an precious advantage, each for a supervisor plus the person. Aside out of your customers, although, the organization you work for or maybe hope to work with sometime soon, can view everyone as being a becoming a more precious enterprise advantage than in the past.
2021 Nov 156-726.77 free practice questions
Q11. What are the possible options to configure the Identity Sources (user identification methods with Identity Awareness)?
A. Identity Agents only
B. Browser-Based Authentication, Active Directory Query, Identity Agents, Terminal Servers (Users have same source IP), RADIUS Accounting C. Browser-Based Authentication, Active Directory Query,Terminal Servers (Users have same source IP)
D. Active Directory Query, Identity Agents, Captive Portal
Answer: B
Q12. Which of the following actions applies to a Risk Level of 2 – Low?
A. Potentially not business related
B. Can bypass security or hide identities
C. Can be misused and cause data leakage or malware infection
D. Can cause data leakage or malware infection without user knowledge
Answer: A
Q13. Which of these mechanisms does a gateway configured with Identity Awareness and LDAP initially use to communicate with a Windows 2003 or 2008 server?
A. RPC
B. WMI
C. HTTP
D. CIFS
Answer: B
Q14. When the Application Control Blade discovers an application, it will provide information on that application's simple properties. Which is an example of a simple property?
A. No Standard Uninstaller
B. Targets Children
C. Uses stealth techniques
D. Auto Start
Answer: D
Q15. Which of these statements describes the Check Point ThreatCloud?
A. Blocks or limits usage of web applications
B. Prevents vulnerability exploits
C. A worldwide collaborative security network
D. Controls access to web sites based on category
Answer: C
Abreast of the times 156-726.77 training:
Q16. If both a security rule and an Application & URL Filtering rule match, which one has higher priority?
A. In the first place there must always be a matching security rule; only if the traffic is allowed, the Application & URL Filtering policy will be processed.
B. It does not matter which rule will be processed first.
C. If the Application & URL Filtering rule has an “Allow” action, it will be applied before the security rule.
D. If either of the rules uses an Access Role in the source field, the security rule has higher priority.
Answer: A
Q17. In what places can an access role be used?
A. In the Application & URL Filtering rule base
B. In the security rule base and DLP policy
C. In the security rule base and in the Application & URL Filtering rule base
D. Access roles can only replace the legacy authentication methods
Answer: C
Q18. What is the correct order that a log flows in order to be processed by SmartEvent components?
A. Firewall > SmartEvent server database > correlation unit > logserver > SmartEvent client
B. Firewall > correlation unit > logserver > SmartEvent server database > SmartEvent client
C. Firewall > logserver > correlation unit > SmartEvent server database > SmartEvent client
D. Firewall > logserver > SmartEvent server database > correlation unit > SmartEvent client
Answer: C
Q19. UserCheck is a way to improve security in the company and to raise the Awareness of the users. Which interaction modes can a firewall administrator choose when configuring UserCheck for a given rule?
A. Block, Ask, Once a day
B. Block, Revoke, Ask
C. Block, Ask, Inform
D. UserCheck is a predefined action and cannot be modified further
Answer: C
Q20. Which of the following actions applies to a Risk Level of 1 – Very Low?
A. Can cause data leakage or malware infection without user knowledge
B. Can bypass security or hide identities
C. Potentially not business related
D. Usually business related, with low risk
Answer: D