Checkpoint 156-727.77 - Threat Prevention Exam

Question #1 (Topic: )
Sensitive corporate data is uploaded to ThreatCloud:
A. When the administrator manually sends suspected traffic to ThreatCloud for inspection. B. Never C. When the administrator configures the sensor to be a SensorNET participant. D. After the bot attack has been confirmed.
Answer: B
Question #2 (Topic: )
Which of the following is information shared via ThreatCloud?
A. Compromised Machine IP Addresses B. Anticipated Attack Methods C. Sensitive Corporate Data D. Address of command and control servers
Answer: D
Question #3 (Topic: )
An end-user calls the helpdesk, complaining that he cannot access a web site. You check
the log and see that an IPS signature is dropping his connections. What can you do?
Change the signature action to:
A. Bypass B. Detect C. Inactive D. Prevent
Answer: B
Question #4 (Topic: )
What is the name of the Check Point cloud-driven Knowledgebase?
A. ThreatSpect B. ThreatCloud C. ThreatWiki D. ThreatEmulator
Answer: C
Question #5 (Topic: )
Which of the following is information uploaded to ThreatCloud?
A. Compromised Machine IP Addresses B. Malware Site IP Addresses C. Anticipated Attack Methods D. Sensitive Corporate Data
Answer: B
Download Exam
Page: 1 / 11
Total 53 questions