Which security principles are indicative of the CloudGuard Secure Public Cloud Blueprint architecture?
Which security principles are indicative of the CloudGuard Secure Public Cloud Blueprint architecture?A . Security with Advanced Threat Prevention; Network Division; Agility, Automation, Efficiency, and Elasticity; with Cloud Borders B. Security with Advanced Threat Prevention Network Unification Agility Automation, Efficiency, and Elasticity; Borderless C. Security with Advanced Threat Prevention: Network...
Which language can be used by users of Cloud Security Posture Management to create custom Security Policies?
Which language can be used by users of Cloud Security Posture Management to create custom Security Policies?A . eXtensible Markup Language (XML) B. Posture Management Language (PML) C. Governance Specific Language (GSL) D. JavaScript Object Notation (JSON)View AnswerAnswer: C
What is vertical scaling?
What is vertical scaling?A . Tunes the environment up and down according to the resource capacity needs B. Tunes the environment by automatically adding or removing resource to the SDN C. Tunes the environment by manually adding or removing resource to an SDDC D. Scaling method that does not require...
Adding new Security Gateways as system load increases is an example of __________
Adding new Security Gateways as system load increases is an example of __________A . Vertical ScalingB . Network ScalingC . Horizontal ScalingD . System ScalingView AnswerAnswer: A
Logging Implied rules, enabling Hit Count and defining advanced VPN functions are all settings
Logging Implied rules, enabling Hit Count and defining advanced VPN functions are all settings that are applied asA . Inline LayerB . Global PropertiesC . Policy SettingsD . Gateway PropertiesView AnswerAnswer: B
What is public cloud?
What is public cloud?A . Computing environment with limited resourcesB . Computing environment located over the internetC . A shared computing environmentD . Computing environment dedicated to one companyView AnswerAnswer: A
Cloud Security Posture Management uses CloudBots to assist with________________.
Cloud Security Posture Management uses CloudBots to assist with________________.A . cloud account configurations and data flowsB . securing IAM account credentials.C . identifying where the organization's security posture need:D . automatic compliance remediationView AnswerAnswer: C
What is the key component in securing and managing any environment?
What is the key component in securing and managing any environment?A . Security Management ServerB . Security GatewayC . Security PolicyD . Security AccessView AnswerAnswer: A
Which APIs are used by Public clouds and Hybrid clouds to support the interactions between cloud resources, on- premises equipment, scripts, orchestration playbooks and CloudGuard Networkcloud resources, on- premise equipment, scripts.
Which APIs are used by Public clouds and Hybrid clouds to support the interactions between cloud resources, on- premises equipment, scripts, orchestration playbooks and CloudGuard Networkcloud resources, on- premise equipment, scripts.A . CloudGuard Management Extension API (CME-API)B . CloudGuard Controller API (CG-API)C . Representational State Transfer (REST) APIsD . Cloud...
Once the Deployment finishes, Cloud Security Posture Management applies default network security posture that does what?
Once the Deployment finishes, Cloud Security Posture Management applies default network security posture that does what?A . Minimizes the risk of external threats by blocking access to highrisk sites and external usersB . Minimizes the risk of external threats by blocking accessed to the internetC . Minimizes the risk of...