Check Point 156-560 Check Point Certified Cloud Specialist (CCCS) Online Training
Check Point 156-560 Online Training
The questions for 156-560 were last updated at Dec 24,2024.
- Exam Code: 156-560
- Exam Name: Check Point Certified Cloud Specialist (CCCS)
- Certification Provider: Check Point
- Latest update: Dec 24,2024
Which is not a Pillar of the Framework for the Cloud?
- A . Performance Efficiency
- B . Cost Optimization
- C . Scalability
- D . Reliability
Can you configure Micro segmentation (control traffic inside a subnet) on Azure?
- A . No. Micro segmentation is not supported on Azure
- B . Yes. via UDR
- C . Yes, via System Routes
- D . Yes, via routes on vNet
Check Point’s Public Cloud model is described as the following
- A . A Security Matrix Model
- B . A Hub and Spoke Model
- C . An Advanced Threat Tunnel Model
- D . A Borderless Model
Which Pillar includes the following principals
• Experiment more often
• Go Global in minutes-
• Use serverless architectures
- A . Reliability
- B . Cost Optimization
- C . Performance Efficiency
- D . Operational Excellence
The Security Administrator needs to reconfigure the API server, which command would need to be ran?
- A . api reboot
- B . api reconf
- C . api restart
- D . api reconfig
The integration of cloud resources into the Security Policy requires establishing a secure connection between_________________
- A . The SDDC, CloudGuard Security Gateways, and the Security Management Server
- B . The SDDC and CloudGuard Security Gateways.
- C . The SDDC and the Security Management Server
- D . CloudGuard Security Gateways and the Security Management Server
Which log file should an administrator gather to expedite the diagnosis of a CloudGuard Controller issue?
- A . $CPDIR/logs/cloud.elg
- B . $DADIR/logs/controller_proxy.elg
- C . $FWDIR/logs/cloud_controller.elg
- D . $FWDIR/logs/cloud_proxy.elg
What are two basic rules Check Point recommends for building an effective policy?
- A . Cleanup and Stealth Rule
- B . VPN and Admin Rules
- C . Implicit and Explicit Rules
- D . Access and Identity Rules
What is Operational Excellence?
- A . The ability of a Workload to function correctly and consistently in all expected
- B . In terms of the cloud, security is about architecting every workload to prevent
- C . The ability to use cloud resources efficiently for meeting system requirements, and
maintaining that efficiency as demand changes and technologies evolve - D . The ability to support development and run workloads effectively
A utility that allows integration between SMS, the CloudGuard Network Solution, and CSPs, allowing the SMS to monitor and control scaling solutions in their associated cloud environments is called
- A . CloudGuard Management Extension (CME)
- B . CloudGuard Controller and Enforcer (CCE)
- C . CloudGuard Scanner and Enforcer (CSE)
- D . CloudGuard Controller (CC)