Monday, May 12, 2014

156-727.77 exam study guide


  • Code:156-727.77  
  • Click Here: more information
  • Exam Demo:
  • QUESTION NO: 1
    Which of these statements describes the Check Point IPS software blade?

    A. Blocks or limits usage of web applications
    B. A worldwide collaborative security network
    C. Prevents vulnerability exploits
    D. Controls access to web sites based on category

    Answer: C


    QUESTION NO: 2
    Which of these statements describes the Check Point ThreatCloud?

    A. A worldwide collaborative security network
    B. Prevents vulnerability exploits
    C. Controls access to web sites based on category
    D. Blocks or limits usage of web applications

    Answer: A


    QUESTION NO: 3
    Which TCP ports allow LDAP users to communicate with the Account Unit?

    A. 689 clear, or 336 encrypted
    B. 636 clear, or 389 encrypted
    C. 336 clear, or 689 encrypted
    D. 389 clear, or 636 encrypted

    Answer: D


    QUESTION NO: 4
    Check Point Intrusion Prevention System (IPS) is available in two deployment methods, as a blade and also a dedicated appliance. What is the dedicated appliance called?

    A. InterSpect Appliance
    B. IPS-1 Sensor
    C. Smart-1 Appliance
    D. Power-1 Appliance

    Answer: B


    QUESTION NO: 5
    What is the minimum amount of RAM needed for a Threat Prevention Appliance?

    A. 4 GB
    B. It depends on the number of software blades enabled.
    C. 2 GB with GAiA in 32-bit mode, 4 GB with GAiA in 64-bit mode
    D. 6 GB

    Answer: A

0 Comments:

Post a Comment

Subscribe to Post Comments [Atom]

<< Home