Upload
certasapcom
View
213
Download
0
Embed Size (px)
DESCRIPTION
We believe in helping our customers achieve their goals. For this reason, we take great care while preparing our Questions and Answers CheckPoint CheckPoint Certification 156-726.77 Secure Web Gateway. Our practice tests CheckPoint CheckPoint Certification 156-726.77 Secure Web Gateway are prepared with the help of highly professional people from the industry, so we benefit from their vast experience and knowledge.
Citation preview
Exam Number/Code:156-726.77
Exam Name:Secure Web Gateway
Version: Demo
http://cert24.com/
QUESTION NO: 1Which of the following actions applies to a Risk Level of 5 – Critical?
A. Can bypass security or hide identitiesB. Potentially not business relatedC. Can be misused and cause data leakage or malware infectionD. Can cause data leakage or malware infection without user knowledge
Answer: A
QUESTION NO: 2Which of the following actions applies to a Risk Level of 4 – High?
A. Can cause data leakage or malware infection without user knowledgeB. Can bypass security or hide identitiesC. Potentially not business relatedD. Can be misused and cause data leakage or malware infection
Answer: A
QUESTION NO: 3Which of the following actions applies to a Risk Level of 3 – Medium?
A. Potentially not business relatedB. Can cause data leakage or malware infection without user knowledgeC. Can be misused and cause data leakage or malware infectionD. Can bypass security or hide identities
Answer: C
QUESTION NO: 4Which of the following actions applies to a Risk Level of 2 – Low?
A. Potentially not business relatedB. Can bypass security or hide identitiesC. Can be misused and cause data leakage or malware infectionD. Can cause data leakage or malware infection without user knowledge
Answer: A
QUESTION NO: 5Which of the following actions applies to a Risk Level of 1 – Very Low?
A. Can cause data leakage or malware infection without user knowledgeB. Can bypass security or hide identitiesC. Potentially not business relatedD. Usually business related, with low risk
Answer: D
QUESTION NO: 6Using Event Viewer in SmartEvent, a Security Administrator discovers that the ApplicationBlade has detected three applications: YouTube, Tor, and PC in IE. Of these threeapplications, which would be considered the most dangerous?
A. TorB. PC in IEC. YouTube
Answer: A
QUESTION NO: 7During the Application Control Discovery process, what is the best source of informationfor decisions on blocking or not blocking an application?
A. The Help DeskB. The Group ManagerC. The UserD. The Security Administrator
Answer: C
QUESTION NO: 8Who is best able to provide the justification for allowing access to some higher riskapplications?
A. The Help DeskB. The Security AdministratorC. The UserD. The Group Manager
Answer: C
QUESTION NO: 9When analyzing Application Control data with SmartEvent, using the predefined queries,how are the events grouped? In order of:
A. date/timeB. rule appliedC. riskD. number of megabytes used
Answer: D
QUESTION NO: 10Which of the following statement is true regarding SmartEvent Intro? SmartEvent Intro:
A. requires no license, only a contractB. has been discontinuedC. is free, and therefore requires no licenseD. only view events from one blade
Answer: D