Checkpoint 156-727.77 - Threat Prevention Exam

Page:    1 / 11   
Total 53 questions

Sensitive corporate data is uploaded to ThreatCloud:

  • A. When the administrator manually sends suspected traffic to ThreatCloud for inspection.
  • B. Never
  • C. When the administrator configures the sensor to be a SensorNET participant.
  • D. After the bot attack has been confirmed.


Answer : B

Which of the following is information shared via ThreatCloud?

  • A. Compromised Machine IP Addresses
  • B. Anticipated Attack Methods
  • C. Sensitive Corporate Data
  • D. Address of command and control servers


Answer : D

An end-user calls the helpdesk, complaining that he cannot access a web site. You check the log and see that an IPS signature is dropping his connections. What can you do?
Change the signature action to:

  • A. Bypass
  • B. Detect
  • C. Inactive
  • D. Prevent


Answer : B

What is the name of the Check Point cloud-driven Knowledgebase?

  • A. ThreatSpect
  • B. ThreatCloud
  • C. ThreatWiki
  • D. ThreatEmulator


Answer : C

Which of the following is information uploaded to ThreatCloud?

  • A. Compromised Machine IP Addresses
  • B. Malware Site IP Addresses
  • C. Anticipated Attack Methods
  • D. Sensitive Corporate Data


Answer : B

Page:    1 / 11   
Total 53 questions