156-727.77 Question And Answer

156-727.77 Question And Answer

  • Code:156-727.77
  • Click Here: more information
  • Exam Demo:
  • QUESTION NO: 1
    Which of these statements describes the Check Point IPS software blade?
    A. Blocks or limits usage of web applications
    B. A worldwide collaborative security network
    C. Prevents vulnerability exploits
    D. Controls access to web sites based on category
    Answer: C
    QUESTION NO: 2
    Which of these statements describes the Check Point ThreatCloud?
    A. A worldwide collaborative security network
    B. Prevents vulnerability exploits
    C. Controls access to web sites based on category
    D. Blocks or limits usage of web applications
    Answer: A
    QUESTION NO: 3
    Which TCP ports allow LDAP users to communicate with the Account Unit?
    A. 689 clear, or 336 encrypted
    B. 636 clear, or 389 encrypted
    C. 336 clear, or 689 encrypted
    D. 389 clear, or 636 encrypted
    Answer: D
    QUESTION NO: 4
    Check Point Intrusion Prevention System (IPS) is available in two deployment methods, as a blade and also a dedicated appliance. What is the dedicated appliance called?
    A. InterSpect Appliance
    B. IPS-1 Sensor
    C. Smart-1 Appliance
    D. Power-1 Appliance
    Answer: B
    QUESTION NO: 5
    What is the minimum amount of RAM needed for a Threat Prevention Appliance?
    A. 4 GB
    B. It depends on the number of software blades enabled.
    C. 2 GB with GAiA in 32-bit mode, 4 GB with GAiA in 64-bit mode
    D. 6 GB
    Answer: A