Which of the following is a common limitation of cloud platforms?

Which of the following is a common limitation of cloud platforms?A . Network address translations B. Custom Route Tables C. Identity and Access Management D. Packet ForwardingView AnswerAnswer: A

January 9, 2023 No Comments READ MORE +

Which autoscaling method requires the VM to temporarily shut down while it processes system modification?

Which autoscaling method requires the VM to temporarily shut down while it processes system modification?A . Both Vertical and Horizontal Scaling B. Vertical Scaling C. Horizontal Scaling D. Neither autoscaling method requires the VM to}View AnswerAnswer: B

January 8, 2023 No Comments READ MORE +

Why is an IAM role created when installing a cluster on AWS?

Why is an IAM role created when installing a cluster on AWS?A . In order to perform cluster related changes B. It is created for the installation process only, it gets deleted C. IAM role is created for auditing purposes D. IAM role is not createdView AnswerAnswer: C

January 8, 2023 No Comments READ MORE +

Cloud Security Posture Management operational modes for cloud accounts are:

Cloud Security Posture Management operational modes for cloud accounts are:A . Read Only, Full Protection. Region Lock B. Read Only, Read/Write. Region Lock C. Read Only, Read/Write. Full Protection D. Read/Write, Partial Protection, Full ProtectionView AnswerAnswer: A Explanation: Text, letter Description automatically generated

January 8, 2023 No Comments READ MORE +

Which solution delivers a software platform for public cloud security and compliance orchestration?

Which solution delivers a software platform for public cloud security and compliance orchestration?A . CloudGuard Network Public B. CloudGuard Network Private C. CloudGuard SaaS D. Cloud Security Posture ManagementView AnswerAnswer: D

January 7, 2023 No Comments READ MORE +

Logging Implied rules, enabling Hit Count and defining advanced VPN functions are all settings that are applied as

Logging Implied rules, enabling Hit Count and defining advanced VPN functions are all settings that are applied asA . Inline Layer B. Global Properties C. Policy Settings D. Gateway PropertiesView AnswerAnswer: B

January 7, 2023 No Comments READ MORE +

Check Point’s Public Cloud model is described as the following

Check Point’s Public Cloud model is described as the followingA . A Security Matrix Model B. A Hub and Spoke Model C. An Advanced Threat Tunnel Model D. A Borderless ModelView AnswerAnswer: B Explanation: https://www.checkpoint.com/downloads/products/check-point-secure-cloud-blueprint-azure-whitepaper.pdf (p. 5)

January 7, 2023 No Comments READ MORE +

The integration of cloud resources into the Security Policy requires establishing a secure connection between_________________

The integration of cloud resources into the Security Policy requires establishing a secure connection between_________________A . The SDDC, CloudGuard Security Gateways, and the Security Management Server B. The SDDC and CloudGuard Security Gateways. C. The SDDC and the Security Management Server D. CloudGuard Security Gateways and the Security Management ServerView...

January 6, 2023 No Comments READ MORE +

To troubleshoot CloudGuard Controller, administrators can execute the following command:

To troubleshoot CloudGuard Controller, administrators can execute the following command:A . cloudguard troubleshoot B. cloudguard security C. cloudguard off D. cloudguard onView AnswerAnswer: D

January 6, 2023 No Comments READ MORE +

Once the Deployment finishes, Cloud Security Posture Management applies default network security posture that does what?

Once the Deployment finishes, Cloud Security Posture Management applies default network security posture that does what?A . Minimizes the risk of external threats by blocking access to high risk sites and external users B. Minimizes the risk of external threats by blocking accessed to the internet C. Minimizes the risk...

January 5, 2023 No Comments READ MORE +