♥♥ 2018 NEW RECOMMEND ♥♥

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 156-727.77 Exam Dumps (PDF & VCE):
Available on: https://www.exambible.com/156-727.77-exam/

Pass4sure offers free demo for 156-727.77 exam. "Threat Prevention", also known as 156-727.77 exam, is a Check Point Certification. This set of posts, Passing the Check Point 156-727.77 exam, will help you answer those questions. The 156-727.77 Questions & Answers covers all the knowledge points of the real exam. 100% real Check Point 156-727.77 exams and revised by experts!

Q1. Which software blades are characteristic to a Threat Prevention Appliance? 

A. Anti-Virus, Anti-Bot, IPS, Identity Awareness 

B. Anti-Virus, Anti-Bot, IPS, URL Filtering, Identity Awareness 

C. Anti-Virus, Anti-Bot, IPS, Application Control, URL Filtering, Identity Awareness 

D. Anti-Virus, Anti-Bot, IPS, URL Filtering, Identity Awareness, SmartEvent 


Q2. What is the main purpose of the ThreatCloud? 

A. It is used in conjunction with IPS. 

B. This is the place where ThreatWiki fetches the actual information. 

C. It feeds security gateway software blades (i.e. Anti-Virus and Anti-Bot) with real-time security intelligence. 

D. It is a database used by SANS institute (formerly known as StormCenter). 


Q3. In SmartViewTracker, you see a log record of type “control” and severity “critical” for the product “Threat Emulation” which says: “cloud emulation failed. Reason: failed to authenticate gateway...” 

What is likely to be the reason for this failure? 

A. The user provided the wrong credentials to the gateway 

B. The gateway should be configured in a way that Threat Emulation can be done locally in case the cloud is not accessible 

C. The cloud is not accessible right now 

D. Verify the gateway license / contract 


Q4. An end-user calls the helpdesk, complaining that he cannot access a web site.  You check the log and see that an IPS signature is dropping his connections. What can you do? Change the signature action to: 

A. Bypass 

B. Detect 

C. Inactive 

D. Prevent 


Q5. Check Point Intrusion Prevention System (IPS) is available in two deployment methods, as a blade and also a dedicated appliance. What is the dedicated appliance called? 

A. InterSpect Appliance 

B. IPS-1 Sensor 

C. Smart-1 Appliance 

D. Power-1 Appliance 


Q6. Order the steps to bypass the IPS for specific protection: 

a. Open the SmartDashboard 

b. Find the protection you want to bypass 

c. Add the exception for this specific protection 

d. Go to Network Exception tab 

e. Click New. 

f. Go to Protections view 

g. Install Security policy 

h. Go to IPS tab 

A. a, g, h, f, e, c, b, d 

B. a, d, f, h, e, c, b, g 

C. a, h, f, b, d, e, c, g 

D. a, f, h, c, e, d, b, g 


Q7. Which of the following is information uploaded to ThreatCloud? 

A. Compromised Machine IP Addresses 

B. Malware Site IP Addresses 

C. Anticipated Attack Methods 

D. Sensitive Corporate Data 


Q8. John is troubleshooting a dropped traffic issue. Looking in SmartViewTracker, he cannot find anything related to it. What CLI command might help him in this situation where he suspects a possible problem with IPS? 

A. All of the information is visible in SmartViewTracker without additional commands. 

B. fw ctl pstat 

C. fw logexport | grep drop 

D. fw ctl zdebug drop