Checkpoint 156-726.77 - Secure Web Gateway Exam

Page:    1 / 14   
Total 66 questions

What is the correct order for these Application Control implementation steps?

  • A. Discover, Control, Consult
  • B. Discover, Consult, Control
  • C. Consult, Control, Discover
  • D. Consult, Discover Control


Answer : B

You want to view application traffic logs in real-time. Which tool would be BEST to use?

  • A. SmartEvent Intro
  • B. SmartView Monitor
  • C. SmartView Tracker
  • D. SmartEvent


Answer : C

After you enable Application Control, where can you see application-related logs? In:

  • A. SmartEvent.
  • B. SmartView Tracker and SmartLog.
  • C. SmartEvent, SmartView Tracker, and SmartLog.
  • D. SmartView Tracker.


Answer : C

Which of the following actions applies to a Risk Level of 2 – Low?

  • A. Potentially not business related
  • B. Can bypass security or hide identities
  • C. Can be misused and cause data leakage or malware infection
  • D. Can cause data leakage or malware infection without user knowledge


Answer : A

For troubleshooting purposes, Shira needs to check the currently identified users on the gateway. Which CLI command shows all users/machines and all the activity records associated with them?

  • A. pep monitor -a
  • B. pdp monitor all
  • C. fw monitor pdp all
  • D. pdp control monitor all


Answer : B

Page:    1 / 14   
Total 66 questions