Which of the following is a common limitation of cloud platforms?
Which of the following is a common limitation of cloud platforms?A . Network address translations B. Custom Route Tables C. Identity and Access Management D. Packet ForwardingView AnswerAnswer: A
Which autoscaling method requires the VM to temporarily shut down while it processes system modification?
Which autoscaling method requires the VM to temporarily shut down while it processes system modification?A . Both Vertical and Horizontal Scaling B. Vertical Scaling C. Horizontal Scaling D. Neither autoscaling method requires the VM to}View AnswerAnswer: B
Why is an IAM role created when installing a cluster on AWS?
Why is an IAM role created when installing a cluster on AWS?A . In order to perform cluster related changes B. It is created for the installation process only, it gets deleted C. IAM role is created for auditing purposes D. IAM role is not createdView AnswerAnswer: C
Cloud Security Posture Management operational modes for cloud accounts are:
Cloud Security Posture Management operational modes for cloud accounts are:A . Read Only, Full Protection. Region Lock B. Read Only, Read/Write. Region Lock C. Read Only, Read/Write. Full Protection D. Read/Write, Partial Protection, Full ProtectionView AnswerAnswer: A Explanation: Text, letter Description automatically generated
Which solution delivers a software platform for public cloud security and compliance orchestration?
Which solution delivers a software platform for public cloud security and compliance orchestration?A . CloudGuard Network Public B. CloudGuard Network Private C. CloudGuard SaaS D. Cloud Security Posture ManagementView AnswerAnswer: D
Logging Implied rules, enabling Hit Count and defining advanced VPN functions are all settings that are applied as
Logging Implied rules, enabling Hit Count and defining advanced VPN functions are all settings that are applied asA . Inline Layer B. Global Properties C. Policy Settings D. Gateway PropertiesView AnswerAnswer: B
Check Point’s Public Cloud model is described as the following
Check Point’s Public Cloud model is described as the followingA . A Security Matrix Model B. A Hub and Spoke Model C. An Advanced Threat Tunnel Model D. A Borderless ModelView AnswerAnswer: B Explanation: https://www.checkpoint.com/downloads/products/check-point-secure-cloud-blueprint-azure-whitepaper.pdf (p. 5)
The integration of cloud resources into the Security Policy requires establishing a secure connection between_________________
The integration of cloud resources into the Security Policy requires establishing a secure connection between_________________A . The SDDC, CloudGuard Security Gateways, and the Security Management Server B. The SDDC and CloudGuard Security Gateways. C. The SDDC and the Security Management Server D. CloudGuard Security Gateways and the Security Management ServerView...
To troubleshoot CloudGuard Controller, administrators can execute the following command:
To troubleshoot CloudGuard Controller, administrators can execute the following command:A . cloudguard troubleshoot B. cloudguard security C. cloudguard off D. cloudguard onView AnswerAnswer: D
Once the Deployment finishes, Cloud Security Posture Management applies default network security posture that does what?
Once the Deployment finishes, Cloud Security Posture Management applies default network security posture that does what?A . Minimizes the risk of external threats by blocking access to high risk sites and external users B. Minimizes the risk of external threats by blocking accessed to the internet C. Minimizes the risk...