CloudGuard uses several management tools to create and manage Security Policies. Which is NOT one of those tools?
AGaia Portal
BCloudGuard Controller
CSmartConsole
DCLI
Which is not a responsibility of the CSP (Cloud Service Provider)?
AInfrastructure Patching and Configuration
BPhysical and Environment Controls
CData
DCSP Employee Training
Which APIs are used by Public clouds and Hybrid clouds to support the interactions between cloud resources, on- premise equipment, scripts, orchestration playbooks, and CloudGuard Network
ACloudGuard Management Extension API (CME-API)
BCloudGuard Controller API (CG-API)
CRepresentational Slate Transfer (REST) APIs
DCloud Security Posture Management (CSPM) API
One of the limitations in deploying Check Point CloudGuard Cluster High Availability is that
AState synchronization is required and must be done ONLY on a dedicated link
BHigh Availability configurations support only two Security Gateway members
CHigh Availability configurations support only three Security Gateway members
DVMAC mode is mandatory for all cluster interfaces
Question 6
Deploying a Management Server
0
Question 7
Adaptive Security Policy
Question 8
Introducing CloudGuard
Question 9
Introducing CloudGuard
Question 10
Adaptive Security Policy
Question 11
High Availability and Scalability
Question 12
Logs, Monitoring, and Troubleshooting
Question 13
High Availability and Scalability
Question 14
Introducing CloudGuard
Question 15
Introducing CloudGuard
Question 16
Automation and Orchestration
Question 17
Introducing CloudGuard
Question 18
Introducing CloudGuard
Question 19
High Availability and Scalability
Question 20
Adaptive Security Policy
Question 21
High Availability and Scalability
Question 22
High Availability and Scalability
Question 23
Adaptive Security Policy
Question 24
Adaptive Security Policy
Question 25
Introducing CloudGuard
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ad
Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Deploying CloudGuard IaaS security solutions involves which process?
AOne that launches virtual machines quickly
BOne that quickly enables network configuration
COne that creates threat prevention boundaries
DMoving hardware to another SDN
Can you configure Micro segmentation (control traffic inside a subnet) on Azure?
ANo, Micro segmentation is not supported on Azure
BYes, via UDR
CYes, via System Routes
DYes, via routes on vNet
Which Security Gateway function inspects cloud applications and workload resources for malicious activity?
AApplication Control
BThreat Prevention
CIdentity Awareness
DAccess Control
Which software blades (Check Point features) are not supported in AWS?
AIPS
BVPN blade
CAll Check Point blades are supported
DMobile Access (SSLVPN)
Which appliance type does the Check Point management control with a single policy?
APhysical
BPhysical, Virtual and Cloud
CPhysical and Cloud
DVirtual and Cloud
Which is not an advantage of the Hub and Spoke Architecture Model?
AAutomation
BNetwork Segmentation
CComplexity
DBorderless
What is Operational Excellence?
AThe ability of a Workload to function correctly and consistently in all expected
BIn terms of the cloud, security is about architecting every workload to prevent
CThe ability to use cloud resources efficiently for meeting system requirements, and maintaining that efficiency as demand changes and technologies evolve
DThe ability to support development and run workloads effectively
What is Reliability according to the Five Pillars?
AThe ability to use cloud resources efficiently for meeting system requirements, and maintaining that efficiency as demand changes and technologies evolve
BThe ability of a Workload to function correctly and consistently in all expected
CThe ability to support development and run workloads effectively
DIn terms of the cloud, security is about architecting every workload to prevent
One of the five pillars of the framework for cloud security is ‘Performance Efficiency’. The design principles of Performance Efficiency include:
AAutomatically recover from failureTest recovery procedures
BAdopt a consumption model -Measure overall efficiency
CGo Global in minutes -Use serverless architectures
DApply security at all layers -Automate security best practices
The framework for cloud security consists of five basic components, or pillars. Making small, reversible changes is a design principle of which of these five pillars?
AReliability
BPerformance Efficiency
CCost Optimization
DOperational Excellence
What are the languages supported for Cloud Templates?
AJSON and YAML
BJSON and Python
CPython and PERL
DYAML and Python
Which is not a responsibility of the Customer?
AInfrastructure Patching and Configuration
BService, Communication, and Data Security
CGuest OS and Application Patching and Configuration
DCustomer Employee Training
Which of the following is the Customer’s Responsibility in the shared responsibility model used in the cloud?
ACustomer Employee Training
BInfrastructure Patching
CPhysical and Environment Controls
DInfrastructure Configuration
What is vertical scaling?
ATunes the environment up and down according to the resource capacity needs.
BTunes the environment by automatically adding or removing resources to the SDN.
CTunes the environment by manually adding or removing resources to an SDDC.
DScaling method that does not require a system shutdown to add or remove resources.
The integration of cloud resources into the Security Policy requires establishing a secure connection between:
AThe SDDC, CloudGuard Security Gateways, and the Security Management Server.
BThe SDDC and CloudGuard Security Gateways.
CThe SDDC and the Security Management Server.
DCloudGuard Security Gateways and the Security Management Server.
Adding new Security Gateways as system load increases is an example of:
AVertical Scaling
BNetwork Scaling
CHorizontal Scaling
DSystem Scaling
Which hub serves as the front end of the Workload that permits inbound web communications such as HTTP traffic from the Internet to reach spoke Workloads?
AWeb Hub
BSouthbound Hub
CEast-West Hub
DNorthbound Hub
Which of these Cloud Platforms support User Defined Routes (UDR) to force traffic destined for spoke networks to go through a network virtual appliance?
AAmazon AWS
BGoogle Cloud Platform
CAmazon AWS and Google Cloud Platform
DMicrosoft Azure
To travel between spokes, non-transitive traffic uses ________ to allow IPv4 and IPv6 traffic to reach a spoke network.
Aa VTI
Bthe Northbound hub
Cthe Southbound hub
DPeering
Check Point’s Public Cloud model is described as the following: