In a CloudGuard deployment, what does the acronym IAM stand for?
A. Information and Adaptability Measures
B. IP Address Management
C. Identity and Access Management
D. Instant Access Management
The best practice for CloudGuard Network deployments utilizes the Hub and Spokes Model. Which of these statements is the most correct for this model.
A. All the security components including SMS, Northbound and Southbound Security Gateways and East-West VPN Gateways will be deployed in one Hub.
B. A Spoke can ONLY consist of a single virtual machine in a dedicated subnet shared between the VM and the Hub.
C. All traffic that enters and exits each spoke must travel through a hub
D. The Hub and Spoke model is applicable ONLY to multi-cloud environments. The Hub includes all the Security Gateways in all cloud environment. Each Spoke includes all resources of a Data Center in a single Cloud Environment.
What is the key component in securing and managing any environment?
A. Security Management Server
B. Security Gateway
C. Security Policy
D. Security Access
The Administrators ability to protect data, systems, and assets While taking advantage of cloud technologies is commonly called
A. Cost Optimization
B. Security
C. Operational Excellence
D. Performance Efficiency
One of the limitations in deploying Check Point CloudGuard Cluster High Availability is that:
A. State synchronization is required and must be done ONLY on a dedicated link
B. High Availability configurations support only two Security Gateway Members
C. High Availability configurations support only three Security Gateway members
D. VMAC mode is mandatory for all cluster interfaces
Logging Implied rules, enabling Hit Count and defining advanced VPN functions are all settings that are applied as
A. Inline Layer
B. Global Properties
C. Policy Settings
D. Gateway Properties
Which function do Load Balancers perform?
A. Trigger capacity on security gateways
B. To secure balance between private and public cloud
C. Direct internet traffic to spoke networks
D. Restrict traffic loads between servers
After the cloud acquisition process finishes. Cloud Security Posture Security module secures access to cloud environments by performing controls access to cloud environments by performing the following tasks: Visualizes Security Policies in cloud environments, control access to protected cloud assets with short-term dynamic access leases, and______________.
A. Automatically Installs Policies
B. Deploys new management resources
C. Manages Network Security Groups
D. Deploys new internal cloud resources
What can Data Center Objects represent?
A. vNets. VPCs or Network Security Groups
B. Compute. Regions or Availability Zones
C. Public IP. Private IP NAT or IAM roles
D. Cloud Data Center. Tags, subnets, or hosts
REST is an acronym for the following
A. Representation of Security Traffic
B. Really Efficient Security Template
C. Representational State Transfer
D. Real Security Threat