156-727.77 Threat Prevention (Exam 1)

156-727.77 Threat Prevention (Exam 1)

created by Fisher BRink (@fisher) at Feb. 8, 2016
  • Which of these statements describes the Check Point IPS software blade?

  • Which of these statements describes the Check Point ThreatCloud?

  • Which TCP ports allow LDAP users to communicate with the Account Unit?

  • Check Point Intrusion Prevention System (IPS) is available in two deployment metho...

  • What is the minimum amount of RAM needed for a Threat Prevention Appliance?

  • Which software blades are characteristic to a Threat Prevention Appliance?

  • Can the Anti-Bot software blade be enabled on a Secure Web Gateway as well?

  • Which of these is a Check Point Firewall attribute?

  • What is the name of Check Point collaborative network that delivers real-time dyna...

  • What is the main purpose of the ThreatCloud?

  • Which of the following is information uploaded to ThreatCloud?

  • Which of the following is information shared via ThreatCloud?

  • Which of the following is information shared via ThreatCloud?

  • Sensitive corporate data is uploaded to ThreatCloud:

  • What is the name of the Check Point cloud-driven Knowledgebase?

  • What filters can be used in Check Point ThreatWiki (either via ThreatWiki.checkpoi...

  • Which of the following is a searchable database of all known threats detected by s...

  • Check Point's IPS blade provides two pre-defined profiles. Which of the following ...

  • When adding IPS to a gateway, which profile will be set?

  • Check Point Signature teams are constantly monitoring the threat space.

Be the first to review
Login and Review
  • info
    Quiz Info
  • date_range
    Feb. 8, 2016, 3:29 a.m.
    help_outline
    20 questions
    dvr
    0 completed
    remove_red_eye
    13 views
    people
    0 takers
    folder

  • 156-727.77 Threat Prevention (Exam 1) QR code

Ratings

star_borderstar_borderstar_borderstar_borderstar_border
ratings