Which of these is true of the CloudGuard Controller?
Which of these is true of the CloudGuard Controller?A . CloudGuard Controller manually updates SmartConsole security tads and API connectionsB . CloudGuard Controller only displays cloud-based Security Gateway objectsC . CloudGuard Controller maintains visibility of the protected cloud environmentD . CoudGuard Control statically .denies Cloud resources created within a single...
Once the Deployment finishes, Cloud Security Posture Management applies default network security posture that does what?
Once the Deployment finishes, Cloud Security Posture Management applies default network security posture that does what?A . Minimizes the risk of external threats by blocking access to high risk sites and external usersB . Minimizes the risk of external threats by blocking accessed to the internetC . Minimizes the risk...
What is Operational Excellence?
What is Operational Excellence?A . The ability of a Workload to function correctly and consistently in all expectedB . In terms of the cloud, security is about architecting every workload to preventC . The ability to use cloud resources efficiently for meeting system requirements, and maintaining that efficiency as demand...
Which Pillar includes the following principals
Which Pillar includes the following principals • Experiment more often • Go Global in minutes- • Use serverless architecturesA . ReliabilityB . Cost OptimizationC . Performance EfficiencyD . Operational ExcellenceView AnswerAnswer: C
Check Point’s Public Cloud model is described as the following
Check Point’s Public Cloud model is described as the followingA . A Security Matrix ModelB . A Hub and Spoke ModelC . An Advanced Threat Tunnel ModelD . A Borderless ModelView AnswerAnswer: B Explanation: https://www.checkpoint.com/downloads/products/check-point-secure-cloud-blueprint-azure-whitepaper.pdf (p. 5)
Why is an IAM role created when installing a cluster on AWS?
Why is an IAM role created when installing a cluster on AWS?A . In order to perform cluster related changesB . It is created for the installation process only, it gets deletedC . IAM role is created for auditing purposesD . IAM role is not createdView AnswerAnswer: C
Which log file should an administrator gather to expedite the diagnosis of a CloudGuard Controller issue?
Which log file should an administrator gather to expedite the diagnosis of a CloudGuard Controller issue?A . $CPDIR/logs/cloud.elgB . $DADIR/logs/controller_proxy.elgC . $FWDIR/logs/cloud_controller.elgD . $FWDIR/logs/cloud_proxy.elgView AnswerAnswer: D
What is vertical scaling?
What is vertical scaling?A . Tunes the environment up and down according to the resource capacity needsB . Tunes the environment by automatically adding or removing resource to the SDNC . Tunes the environment by manually adding or removing resource to an SDDCD . Scaling method that does not require...
The framework for cloud security consists of five basic components, or pillars Making small, reversible changes is a design principle of which of these five pillars
The framework for cloud security consists of five basic components, or pillars Making small, reversible changes is a design principle of which of these five pillarsA . ReliabilityB . Performance EfficiencyC . Cost OptimizationD . Operational ExcellenceView AnswerAnswer: D Explanation: There are five design principles for operational excellence in the...
A utility that allows integration between SMS, the CloudGuard Network Solution, and CSPs, allowing the SMS to monitor and control scaling solutions in their associated cloud environments is called
A utility that allows integration between SMS, the CloudGuard Network Solution, and CSPs, allowing the SMS to monitor and control scaling solutions in their associated cloud environments is calledA . CloudGuard Management Extension (CME)B . CloudGuard Controller and Enforcer (CCE)C . CloudGuard Scanner and Enforcer (CSE)D . CloudGuard Controller (CC)View...