Page 1 out of 10. Viewing questions 1-10 out of 100
Question 1
Check Points Public Cloud model is described as the following:
A.
A Security Matrix Model
B.
A Hub and Spoke Model
C.
An Advanced Threat Tunnel Model
D.
A Borderless Network Model
Answer:
d
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 2
What is the primary difference between Vertical and Horizontal autoscaling?
A.
Vertical scaling doesnt require moving resources but horizontal scaling does.
B.
Vertical scaling is automatic and horizontal scaling is manual.
C.
Vertical scaling is linear and horizontal scaling goes across.
D.
Vertical scaling requires a virtual machine to completely shut down as opposed to horizontal scaling transferring resources without having to power down the VM.
Answer:
d
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 3
What are the two authentication methods supported by Azure data center objects?
A.
Check Point username/password and Service Principal
B.
Azure AD username/password and Service Principal
C.
Azure Service principal and management certificate
D.
Check Point username/password and Azure AD username/password
Answer:
c
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 4
Which is not a deployment method for CloudGuard solutions using CSP resources?
A.
Terraform
B.
Shell
C.
CLI
D.
CPS Portal
Answer:
d
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 5
What is Cost Optimization?
A.
The ability of the system to deliver business value at the lowest cost point
B.
In terms of the cloud, security is about architecting every workload to prevent
C.
The ability of a Workload to function correctly and consistently in all expected
D.
The ability to support development and run workloads effectively
Answer:
a
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 6
Adding new Security Gateways as system load increases is an example of:
A.
Vertical Scaling
B.
Network Scaling
C.
Horizontal Scaling
D.
System Scaling
Answer:
a
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 7
To travel between spokes, non-transitive traffic uses ________ to allow IPv4 and IPv6 traffic to reach a spoke network.
A.
a VTI
B.
the Northbound hub
C.
the Southbound hub
D.
Peering
Answer:
a
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 8
What is the key component in securing and managing any environment?
A.
Security Management Server
B.
Security Gateway
C.
Security Policy
D.
Security Access
Answer:
c
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 9
An organization is using an adaptive security policy where a Data Center Object was imported and used in some rules. When the cloud resource represented by this object changes its IP address, how will the change be effected on the Security Gateway?
A.
If CloudGuard Controller is enabled on the Security Gateway, the gateway will connect with the Cloud account and synchronize all the Data Center Objects used on it.
B.
With a properly functioning configuration, the change will automatically be done on the Security Gateway without any action required by the administrator.
C.
The Data Center Object needs to be refreshed in the SmartConsole and then a policy install will be required.
D.
The change is automatically updated to the Security Management Server and so only a policy install from SmartConsole or with API will be required.
Answer:
c
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 10
How many gateways are supported in a High Availability solution?