Proper study guides for Far out Check Point Threat Prevention certified begins with Check Point 156-727.77 preparation products which designed to deliver the Best Quality 156-727.77 questions by making you pass the 156-727.77 test at your first time. Try the free 156-727.77 demo right now.
2021 Nov 156-727.77 test preparation
Q1. If a bot is detected on your network, which of the following statements is correct regarding anti-bot blade.
A. outbound connections from the infected client are blocked to prevent further infection.
B. outbound connections from the infected client are blocked;, expect the connection to the Check Point ThreatCloud.
C. outbound connections from the infected client to the command and control center, are blocked.
D. outbound connections from every client are blocked, to prevent further data breaches.
Answer: C
Q2. Which of these statements describes the Check Point IPS software blade?
A. Blocks or limits usage of web applications
B. A worldwide collaborative security network
C. Prevents vulnerability exploits
D. Controls access to web sites based on category
Answer: C
Q3. What is the minimum amount of RAM needed for a Threat Prevention Appliance?
A. 4 GB
B. It depends on the number of software blades enabled.
C. 2 GB with GAiA in 32-bit mode, 4 GB with GAiA in 64-bit mode
D. 6 GB
Answer: A
Q4. enforces or monitors traffic, based on the source or destination IP address of the country.
A. IPS Recommended_Protections Profile
B. Geo-protection
C. Secure Web Gateway
D. ThreatCloud
Answer: B
Q5. Order the steps to bypass the IPS for specific protection:
a. Open the SmartDashboard
b. Find the protection you want to bypass
c. Add the exception for this specific protection
d. Go to Network Exception tab
e. Click New.
f. Go to Protections view
g. Install Security policy
h. Go to IPS tab
A. a, g, h, f, e, c, b, d
B. a, d, f, h, e, c, b, g
C. a, h, f, b, d, e, c, g
D. a, f, h, c, e, d, b, g
Answer: C
Up to the immediate present 156-727.77 test engine:
Q6. Looking at these logs, what happened at 10:55?
A. An IPS rule was installed, causing IPS to temporarily stop working
B. The Gateway was rebooted, causing IPS to temporarily stop working
C. A new IPS policy was installed, causing IPS to temporarily stop working
D. IPD Inspections were temporarily suspended, due to high load on the gateway
Answer: D
Q7. Which of the following is a searchable database of all known threats detected by sensors around the world?
A. ThreatCloud
B. ThreatWiki
C. ThreatSpect
D. SmartLog
Answer: B
Q8. SmartEvent has several components that work together to help track down security threats. What is the function of the Correlation Unit as one of those components in the architecture? The Correlation Unit:
A. connects with the SmartEvent Client when generating reports.
B. analyzes each log entry as it enters a log server, according to the Event Policy; when a threat pattern is identified, an event is forwarded to the SmartEvent Server.
C. collects syslog data from third party devices and saves them to the database.
D. correlates all the identified threats with the consolidation policy.
Answer: B
Q9. What is the most common way a computer can become infected with a bot?
A. Malvertising
B. Users accessing malicious web sites
C. Adobe file vulnerabilities
D. Microsoft file vulnerabilities
Answer: B
Q10. SmartLog displays:
A. Information about known threats and provides steps for remediation
B. Events in chart format, with detailed data about threats
C. Real time data, to help identify ongoing threats
D. Historic data that can be used for research purposes
Answer: D