Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What does the Adaptive Security Policy involve to import the Data Center Objects?

A.

CloudGuard API

B.

CloudGuard Controller

C.

CloudGuard Access Control

D.

CloudGuard Gateway

Once the Deployment finishes, Cloud Security Posture Management applies default network security posture that does what?

A.

Minimizes the risk of external threats by blocking access to high risk sites and external users

B.

Minimizes the risk of external threats by blocking accessed to the internet

C.

Minimizes the risk of external threats by blocking access to all internal resources

D.

Minimizes the risks of external threats by blocking access to services and ports

Which log file should an administrator gather to expedite the diagnosis of a CloudGuard Controller issue?

A.

$CPDIR/logs/cloud.elg

B.

$DADIR/logs/controller_proxy.elg

C.

$FWDIR/logs/cloud_controller.elg

D.

$FWDIR/logs/cloud_proxy.elg

Which of the following is a common limitation of cloud platforms?

A.

Network address translations

B.

Custom Route Tables

C.

Identity and Access Management

D.

Packet Forwarding

To troubleshoot CloudGuard Controller, administrators can execute the following command:

A.

cloudguard troubleshoot

B.

cloudguard security

C.

cloudguard off

D.

cloudguard on

Which Security Gateway function inspects cloud applications and workload resources for malicious activity?

A.

Application Control

B.

Threat Prevention

C.

Identity Awareness

D.

Access Control

Which software blades (Check Point features) are not are not supported in AWS?

A.

IPS

B.

VPN blade

C.

All Check Point blades are supported

D.

Mobile Access (SSLVPN)

What is the key component in securing and managing any environment?

A.

Security Management Server

B.

Security Gateway

C.

Security Policy

D.

Security Access

How does micro-segmentation create boundaries and provide network segmentation for CloudGuard?

A.

It creates borders within the cloud's perimeter to protect the major inbound and outbound traffic intersections.

B.

Micro-segmentation does not create boundaries.

C.

It applies a Security Gateway that enforces firewall policies to accept legitimate network traffic flows and deny unauthorized traffic

D.

It places inspection points between different applications, services, and single hosts within the same network segment.

What is Cloud Security according to the Five Pillars?

A.

The ability to support development and run workloads effectively

B.

The ability of a Workload to function correctly and consistently in all expected

C.

The ability to use cloud resources efficiently for meeting system requirements, and maintaining that efficiency as demands changes and technologies evolve

D.

In terms of tie cloud, security is about architecting every workload to prevent