Check Point Signature teams are constantly monitoring the threat space.
A. True, twenty four hours a day, everyday
B. True, except for major holidays
C. True, from Sunday through Thursday
D. False
Which of these statements describes the Check Point IPS software blade?
A. Blocks or limits usage of web applications
B. A worldwide collaborative security network
C. Prevents vulnerability exploits
D. Controls access to web sites based on category
Which of these statements describes the Check Point ThreatCloud?
A. A worldwide collaborative security network
B. Prevents vulnerability exploits
C. Controls access to web sites based on category
D. Blocks or limits usage of web applications
Which TCP ports allow LDAP users to communicate with the Account Unit?
A. 689 clear, or 336 encrypted
B. 636 clear, or 389 encrypted
C. 336 clear, or 689 encrypted
D. 389 clear, or 636 encrypted
Check Point Intrusion Prevention System (IPS) is available in two deployment methods, as a blade and also a dedicated appliance. What is the dedicated appliance called?
A. InterSpect Appliance
B. IPS-1 Sensor
C. Smart-1 Appliance
D. Power-1 Appliance
What is the minimum amount of RAM needed for a Threat Prevention Appliance?
A. 4 GB
B. It depends on the number of software blades enabled.
C. 2 GB with GAiA in 32-bit mode, 4 GB with GAiA in 64-bit mode
D. 6 GB
Which software blades are characteristic to a Threat Prevention Appliance?
A. Anti-Virus, Anti-Bot, IPS, Identity Awareness
B. Anti-Virus, Anti-Bot, IPS, URL Filtering, Identity Awareness
C. Anti-Virus, Anti-Bot, IPS, Application Control, URL Filtering, Identity Awareness
D. Anti-Virus, Anti-Bot, IPS, URL Filtering, Identity Awareness, SmartEvent
Can the Anti-Bot software blade be enabled on a Secure Web Gateway as well?
A. Yes, this is an optional blade for the Secure Web Gateway.
B. No, Anti-Bot needs to be part of the Threat Prevention Appliance.
C. Yes, it can be enabled if IPS is enabled as well.
D. Yes, Anti-Bot is always enabled together with Identity Awareness.
Which of these is a Check Point Firewall attribute?
A. Malicious P2P application protection
B. Buffer overflow prevention
C. Worm injection blocking
D. Granular access control
What is the name of Check Point collaborative network that delivers real-time dynamic security intelligence to Check Point threat prevention blades?
A. ThreatSpect
B. ThreatWiki
C. ThreatCloud
D. ThreatEmulator
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CheckPoint exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 156-727.77 exam preparations and CheckPoint certification application, do not hesitate to visit our Vcedump.com to find your solutions here.