Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Checkpoint 156-560 - Check Point Certified Cloud Specialist (CCCS)

Page: 2 / 3
Total 83 questions

Once the Deployment finishes, Cloud Security Posture Management applies default network security posture that does what?

A.

Minimizes the risk of external threats by blocking access to high risk sites and external users

B.

Minimizes the risk of external threats by blocking accessed to the internet

C.

Minimizes the risk of external threats by blocking access to all internal resources

D.

Minimizes the risks of external threats by blocking access to services and ports

Which software blade provides forensic analysis tools?

A.

Logging Blade

B.

Identity Awareness Blade

C.

Monitoring Blade

D.

SmartEvent Blade

Logging Implied rules, enabling Hit Count and defining advanced VPN functions are all settings that are applied as

A.

Inline Layer

B.

Global Properties

C.

Policy Settings

D.

Gateway Properties

In a CloudGuard deployment, what does the acronym IAM stand for?

A.

Information and Adaptability Measures

B.

IP Address Management

C.

Identity and Access Management

D.

Instant Access Management

How is CloudGuard for Azure licensed in PAYG (Pay As You Go) mode?

A.

Per hour based on resources consumed

B.

Per Gateway

C.

Per Socket

D.

Per vCore

One of the five pillars of the framework for cloud security is ‘Performance Efficiency’. The design principles of Performance Efficiency include:

A.

Automatically recover from failure

Test recovery procedures

B.

Adopt a consumption model -

Measure overall efficiency

C.

Go Global in minutes -

Use serverless architectures

D.

Apply security at all layers -

Automate security best practices

When choosing PAYG (Pay As You Go) licensing in AWS, it is provided:

A.

Via specific dedicated channels

B.

Directly with Check Point

C.

At the marketplace

D.

Through the regular Check Point channels

Which Pillar includes the following principals

• Experiment more often

• Go Global in minutes-

• Use serverless architectures

A.

Reliability

B.

Cost Optimization

C.

Performance Efficiency

D.

Operational Excellence

When using system routes and user defined routes in Azure, which takes precedent?

A.

The user defined route takes precedent

B.

The system route always takes precedent

C.

The most specific route takes precedent

D.

The newest route takes precedent

One of the limitations in deploying Check Point CloudGuard Cluster High Availability is that:

A.

State synchronization is required and must be done ONLY on a dedicated link

B.

High Availability configurations support only two Security Gateway Members

C.

High Availability configurations support only three Security Gateway members

D.

VMAC mode is mandatory for all cluster interfaces