Exambible offers free demo for 156-726.77 exam. "Secure Web Gateway", also known as 156-726.77 exam, is a Check Point Certification. This set of posts, Passing the Check Point 156-726.77 exam, will help you answer those questions. The 156-726.77 Questions & Answers covers all the knowledge points of the real exam. 100% real Check Point 156-726.77 exams and revised by experts!

Q25. When the Application Control Blade discovers an application, it will provide information on that application's simple properties. Which is an example of a simple property? 

A. Uses stealth techniques 

B. Targets Children 

C. No Standard Uninstaller 

D. Uses Web Connection 

Answer:


Q26. A is malicious software that invades your computer, taking control of it and connecting with criminal operations? 

A. Exploit 

B. Virus 

C. Trojan 

D. Bot 

Answer:


Q27. Application Control is centrally managed. What Application Control component allows you to view user online behavior? 

A. Event View 

B. Security Manager 

C. SmartTracker 

D. AppWiki 

Answer:


Q28. An Administrator would like to protect a network from Microsoft application vulnerability exploits. What Check Point blades would be needed to address this requirement? 

A. URL Filtering 

B. Application Control 

C. ThreatCloud 

D. IPS 

Answer:


Q29. As an Administrator, you must enforce IP spoofing protection on your endpoints. What Identity Awareness solution allows packet tagging? 

A. Active Directory query 

B. Identity Agent - light 

C. Terminal Server – Identity Agent 

D. Identity Agent - full 

Answer:


Q30. Which of these statements describes the Check Point URL Filtering software blade? 

A. A worldwide collaborative security network 

B. Controls access to web sites based on category 

C. Blocks or limits usage of web applications 

D. Prevents vulnerability exploits 

Answer:


Q31. When the Application Control Blade discovers an application, it will provide information on that application's simple properties. Which is an example of a simple property? 

A. Uses stealth techniques 

B. Targets Children 

C. No Standard Uninstaller 

D. Sends Email 

Answer:


Q32. If both a security rule and an Application & URL Filtering rule match, which one has higher priority? 

A. In the first place there must always be a matching security rule; only if the traffic is allowed, the Application & URL Filtering policy will be processed. 

B. It does not matter which rule will be processed first. 

C. If the Application & URL Filtering rule has an “Allow” action, it will be applied before the security rule. 

D. If either of the rules uses an Access Role in the source field, the security rule has higher priority. 

Answer: