What is Operational Excellence?
What is Operational Excellence?A . The ability of a Workload to function correctly and consistently in all expectedB . In terms of the cloud, security is about architecting every workload to preventC . The ability to use cloud resources efficiently for meeting system requirements, and maintaining that efficiency as demand...
Which Pillar includes the following principals
Which Pillar includes the following principals • Experiment more often • Go Global in minutes- • Use serverless architecturesA . ReliabilityB . Cost OptimizationC . Performance EfficiencyD . Operational ExcellenceView AnswerAnswer: C
Check Point’s Public Cloud model is described as the following
Check Point’s Public Cloud model is described as the followingA . A Security Matrix ModelB . A Hub and Spoke ModelC . An Advanced Threat Tunnel ModelD . A Borderless ModelView AnswerAnswer: B Explanation: https://www.checkpoint.com/downloads/products/check-point-secure-cloud-blueprint-azure-whitepaper.pdf (p. 5)
Why is an IAM role created when installing a cluster on AWS?
Why is an IAM role created when installing a cluster on AWS?A . In order to perform cluster related changesB . It is created for the installation process only, it gets deletedC . IAM role is created for auditing purposesD . IAM role is not createdView AnswerAnswer: C
Which log file should an administrator gather to expedite the diagnosis of a CloudGuard Controller issue?
Which log file should an administrator gather to expedite the diagnosis of a CloudGuard Controller issue?A . $CPDIR/logs/cloud.elgB . $DADIR/logs/controller_proxy.elgC . $FWDIR/logs/cloud_controller.elgD . $FWDIR/logs/cloud_proxy.elgView AnswerAnswer: D
What is vertical scaling?
What is vertical scaling?A . Tunes the environment up and down according to the resource capacity needsB . Tunes the environment by automatically adding or removing resource to the SDNC . Tunes the environment by manually adding or removing resource to an SDDCD . Scaling method that does not require...
The framework for cloud security consists of five basic components, or pillars Making small, reversible changes is a design principle of which of these five pillars
The framework for cloud security consists of five basic components, or pillars Making small, reversible changes is a design principle of which of these five pillarsA . ReliabilityB . Performance EfficiencyC . Cost OptimizationD . Operational ExcellenceView AnswerAnswer: D Explanation: There are five design principles for operational excellence in the...
A utility that allows integration between SMS, the CloudGuard Network Solution, and CSPs, allowing the SMS to monitor and control scaling solutions in their associated cloud environments is called
A utility that allows integration between SMS, the CloudGuard Network Solution, and CSPs, allowing the SMS to monitor and control scaling solutions in their associated cloud environments is calledA . CloudGuard Management Extension (CME)B . CloudGuard Controller and Enforcer (CCE)C . CloudGuard Scanner and Enforcer (CSE)D . CloudGuard Controller (CC)View...
Which of the following is a common limitation of cloud platforms?
Which of the following is a common limitation of cloud platforms?A . Network address translationsB . Custom Route TablesC . Identity and Access ManagementD . Packet ForwardingView AnswerAnswer: A
Which security principles are indicative of the CloudGuard Secure Public Cloud Blueprint architecture?
Which security principles are indicative of the CloudGuard Secure Public Cloud Blueprint architecture?A . Security with Advanced Threat Prevention; Network Division; Agility, Automation, Efficiency, and Elasticity; with Cloud BordersB . Security with Advanced Threat Prevention Network Unification Agility Automation, Efficiency, and Elasticity; BorderlessC . Security with Advanced Threat Prevention: Network...