Cloud Security Posture Management (CSPM) operates as which type of service based platform?

Cloud Security Posture Management (CSPM) operates as which type of service based platform?A . CaaS B. SaaS C. PaaS D. laaSView AnswerAnswer: D

January 14, 2023 No Comments READ MORE +

Can you configure Micro segmentation (control traffic inside a subnet) on Azure?

Can you configure Micro segmentation (control traffic inside a subnet) on Azure?A . No. Micro segmentation is not supported on Azure B. Yes. via UDR C. Yes, via System Routes D. Yes, via routes on vNetView AnswerAnswer: C

January 14, 2023 No Comments READ MORE +

How is CloudGuard for Azure licensed in BYOL (Bring your own license) mode?

How is CloudGuard for Azure licensed in BYOL (Bring your own license) mode?A . Per usage B. Per Socket C. Per vCore D. Per GatewayView AnswerAnswer: C

January 14, 2023 No Comments READ MORE +

How is CloudGuard for Azure licensed in PAYG (Pay As You Go) mode?

How is CloudGuard for Azure licensed in PAYG (Pay As You Go) mode?A . Per hour based on resources consumed B. Per Gateway C. Per Socket D. Per vCoreView AnswerAnswer: A Explanation: Graphical user interface, text, application, email Description automatically generated

January 13, 2023 No Comments READ MORE +

Which of these is true of the CloudGuard Controller?

Which of these is true of the CloudGuard Controller?A . CloudGuard Controller manually updates SmartConsole security tads and API connections B. CloudGuard Controller only displays cloud-based Security Gateway objects C. CloudGuard Controller maintains visibility of the protected cloud environment D. CoudGuard Control statically .denies Cloud resources created within a single...

January 13, 2023 No Comments READ MORE +

What is Operational Excellence?

What is Operational Excellence?A . The ability of a Workload to function correctly and consistently in all expected B. In terms of the cloud, security is about architecting every workload to prevent C. The ability to use cloud resources efficiently for meeting system requirements, and maintaining that efficiency as demand...

January 11, 2023 No Comments READ MORE +

What are two basic rules Check Point recommends for building an effective policy?

What are two basic rules Check Point recommends for building an effective policy?A . Cleanup and Stealth Rule B. VPN and Admin Rules C. Implicit and Explicit Rules D. Access and Identity RulesView AnswerAnswer: A Explanation: Text Description automatically generated

January 11, 2023 No Comments READ MORE +

Which is not a Pillar of the Framework for the Cloud?

Which is not a Pillar of the Framework for the Cloud?A . Performance Efficiency B. Cost Optimization C. Scalability D. ReliabilityView AnswerAnswer: C Explanation: https://emergencetek.com/aws-five-pillars-of-a-well-architected-framework/#:~:text=AWS%20and%20their%20partners%20use,performance%20efficiency %2C%20and%20cost%20optimization.

January 11, 2023 No Comments READ MORE +

How does micro-segmentation create boundaries and provide network segmentation for CloudGuard?

How does micro-segmentation create boundaries and provide network segmentation for CloudGuard?A . It creates borders within the cloud's perimeter to protect the major inbound and outbound traffic intersections. B. Micro-segmentation does not create boundaries. C. It applies a Security Gateway that enforces firewall policies to accept legitimate network traffic flows...

January 10, 2023 No Comments READ MORE +

What can Data Center Objects represent?

What can Data Center Objects represent?A . vNets. VPCs or Network Security Groups B. Compute. Regions or Availability Zones C. Public IP. Private IP NAT or IAM roles D. Cloud Data Center. Tags, subnets, or hostsView AnswerAnswer: C

January 10, 2023 No Comments READ MORE +