Checkpoint 156-727.77 - Threat Prevention Exam
Page: 1 / 11
Total 53 questions
Question #1 (Topic: )
Sensitive corporate data is uploaded to ThreatCloud:
A. When the administrator manually sends suspected traffic to ThreatCloud for inspection.
B. Never
C. When the administrator configures the sensor to be a SensorNET participant.
D. After the bot attack has been confirmed.
Answer: B
Question #2 (Topic: )
Which of the following is information shared via ThreatCloud?
A. Compromised Machine IP Addresses
B. Anticipated Attack Methods
C. Sensitive Corporate Data
D. Address of command and control servers
Answer: D
Question #3 (Topic: )
An end-user calls the helpdesk, complaining that he cannot access a web site. You check
the log and see that an IPS signature is dropping his connections. What can you do?
Change the signature action to:
the log and see that an IPS signature is dropping his connections. What can you do?
Change the signature action to:
A. Bypass
B. Detect
C. Inactive
D. Prevent
Answer: B
Question #4 (Topic: )
What is the name of the Check Point cloud-driven Knowledgebase?
A. ThreatSpect
B. ThreatCloud
C. ThreatWiki
D. ThreatEmulator
Answer: C
Question #5 (Topic: )
Which of the following is information uploaded to ThreatCloud?
A. Compromised Machine IP Addresses
B. Malware Site IP Addresses
C. Anticipated Attack Methods
D. Sensitive Corporate Data
Answer: B