4
Exam Number/Code:156-726.77 Exam Name:Secure Web Gateway Version: Demo http://cert24.com/

cert24 Checkpoint 156-726.77 exam practice

Embed Size (px)

DESCRIPTION

We believe in helping our customers achieve their goals. For this reason, we take great care while preparing our Questions and Answers CheckPoint CheckPoint Certification 156-726.77 Secure Web Gateway. Our practice tests CheckPoint CheckPoint Certification 156-726.77 Secure Web Gateway are prepared with the help of highly professional people from the industry, so we benefit from their vast experience and knowledge.

Citation preview

Page 1: cert24 Checkpoint 156-726.77 exam practice

Exam Number/Code:156-726.77

Exam Name:Secure Web Gateway

Version: Demo

http://cert24.com/

Page 2: cert24 Checkpoint 156-726.77 exam practice

QUESTION NO: 1Which of the following actions applies to a Risk Level of 5 – Critical?

A. Can bypass security or hide identitiesB. Potentially not business relatedC. Can be misused and cause data leakage or malware infectionD. Can cause data leakage or malware infection without user knowledge

Answer: A

QUESTION NO: 2Which of the following actions applies to a Risk Level of 4 – High?

A. Can cause data leakage or malware infection without user knowledgeB. Can bypass security or hide identitiesC. Potentially not business relatedD. Can be misused and cause data leakage or malware infection

Answer: A

QUESTION NO: 3Which of the following actions applies to a Risk Level of 3 – Medium?

A. Potentially not business relatedB. Can cause data leakage or malware infection without user knowledgeC. Can be misused and cause data leakage or malware infectionD. Can bypass security or hide identities

Answer: C

QUESTION NO: 4Which of the following actions applies to a Risk Level of 2 – Low?

A. Potentially not business relatedB. Can bypass security or hide identitiesC. Can be misused and cause data leakage or malware infectionD. Can cause data leakage or malware infection without user knowledge

Answer: A

Page 3: cert24 Checkpoint 156-726.77 exam practice

QUESTION NO: 5Which of the following actions applies to a Risk Level of 1 – Very Low?

A. Can cause data leakage or malware infection without user knowledgeB. Can bypass security or hide identitiesC. Potentially not business relatedD. Usually business related, with low risk

Answer: D

QUESTION NO: 6Using Event Viewer in SmartEvent, a Security Administrator discovers that the ApplicationBlade has detected three applications: YouTube, Tor, and PC in IE. Of these threeapplications, which would be considered the most dangerous?

A. TorB. PC in IEC. YouTube

Answer: A

QUESTION NO: 7During the Application Control Discovery process, what is the best source of informationfor decisions on blocking or not blocking an application?

A. The Help DeskB. The Group ManagerC. The UserD. The Security Administrator

Answer: C

QUESTION NO: 8Who is best able to provide the justification for allowing access to some higher riskapplications?

A. The Help DeskB. The Security AdministratorC. The UserD. The Group Manager

Page 4: cert24 Checkpoint 156-726.77 exam practice

Answer: C

QUESTION NO: 9When analyzing Application Control data with SmartEvent, using the predefined queries,how are the events grouped? In order of:

A. date/timeB. rule appliedC. riskD. number of megabytes used

Answer: D

QUESTION NO: 10Which of the following statement is true regarding SmartEvent Intro? SmartEvent Intro:

A. requires no license, only a contractB. has been discontinuedC. is free, and therefore requires no licenseD. only view events from one blade

Answer: D