Download Check Point Threat Prevention.156-727.77.TestKing.2018-07-03.30q.vcex

Vendor: Checkpoint
Exam Code: 156-727.77
Exam Name: Check Point Threat Prevention
Date: Jul 03, 2018
File Size: 1 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
What is the name of the Check Point cloud-driven Knowledgebase?
  1. ThreatSpect
  2. ThreatCloud
  3. ThreatWiki
  4. ThreatEmulator
Correct answer: C
Question 2
What filters can be used in Check Point ThreatWiki (either via or via ThreatPrevention tab in Dashboard)?
  1. Malware Name, Malware Type
  2. Categories, Risk, Release Date
  3. Risk, Malware Type, Release Date
  4. Categories, Tags, Risk
Correct answer: D
Question 3
Which of the following is a searchable database of all known threats detected by sensors around the world?
  1. ThreatCloud
  2. ThreatWiki
  3. ThreatSpect
  4. SmartLog
Correct answer: B
Question 4
Check Point’s IPS blade provides two pre-defined profiles. Which of the following definitions are correct?
  1. Default_Protection: Provides excellent performance with a sufficient level of protection. 
    Recommended_Protection: Provides the best security with a sufficient level of performance
  2. Default_Protection: Provides tracking only for troubleshooting purposes and evaluation prior to full implementation. 
    Recommended_Protection: Provides excellent performance with a sufficient level of protection.
  3. Default_Protection: Provides the best security with a sufficient level of performance. 
    Recommended_Protection: Provides excellent performance with a sufficient level of protection.
  4. Default_Protection: Is an uneditable profile that prevents all IPS related traffic. 
    Recommended_Protection: Provides excellent performance, flexibility to customize protections and actions, with a sufficient level of protection.
Correct answer: A
Question 5
When adding IPS to a gateway, which profile will be set?
  1. Default_Protection, but with all actions set to “Detect only”
  2. Default_Protection, but with all actions set to “Prevent”
  3. Default_Protection
  4. Recommended_Protection
Correct answer: C
Question 6
Check Point Signature teams are constantly monitoring the threat space.
  1. True, twenty four hours a day, everyday
  2. True, except for major holidays
  3. True, from Sunday through Thursday
  4. False
Correct answer: A
Question 7
IPS is primarily a __________-based engine.
  1. Signature
  2. Difference
  3. Action
  4. Anomaly
Correct answer: A
Question 8
IPS can assist in the discovery of unknown buffer overflow attacks without any pre-defined signatures.
  1. False, only the Threat Emulator blade can discover unknown attacks.
  2. True, if Zero-Day vulnerability is enabled.
  3. False, IPS needs predefined signatures for all functions.
  4. True, if Malicious Code Protector is enabled in IPS.
Correct answer: D
Question 9
What advantage does the Recommended_Profile provide over the Default_Protection profile?
  1. Reduced server load
  2. Accelerated throughput
  3. Advanced reporting options
  4. Higher security posture
Correct answer: D
Question 10
SmartEvent has several components that work together to help track down security threats. What is the function of the Correlation Unit as one of those components in the architecture? The Correlation Unit:
  1. connects with the SmartEvent Client when generating reports.
  2. analyzes each log entry as it enters a log server, according to the Event Policy; when a threat pattern is identified, an event is forwarded to the SmartEvent Server.
  3. collects syslog data from third party devices and saves them to the database.
  4. correlates all the identified threats with the consolidation policy.
Correct answer: B

Use VCE Exam Simulator to open VCE files


Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!