Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Checkpoint 156-560 - Check Point Certified Cloud Specialist (CCCS)

Page: 1 / 3
Total 83 questions

Adaptive Security Policies allow the deployment of new cloud based resources without

A.

Changing the cloud environment

B.

Paying for new resources

C.

Installing New Policies

D.

Installing New Applications

What platform provides continuous compliance and governance assessments that evaluate public infrastructure according to industry to industry standards and best practices?

A.

Cloud Security Posture Management

B.

CloudGuard laaS Public Cloud

C.

CloudGuard SaaS

D.

CloudGuard laaS Private Cloud

What are the Automation tools?

A.

API, CLI, Scripts, Shells and Templates

B.

Terraform and Ansible

C.

AMls

D.

CloudFormation

Which one of the following is part of the Orchestration Playbook process for creating a new spoke and an automated Security Gateway?

A.

Transfer of resources to a VPN

B.

An event trigger

C.

Vertical scaling

D.

Communication with the OS

What is Operational Excellence?

A.

The ability of a Workload to function correctly and consistently in all expected

B.

In terms of the cloud, security is about architecting every workload to prevent

C.

The ability to use cloud resources efficiently for meeting system requirements, and maintaining that efficiency as demand changes and technologies evolve

D.

The ability to support development and run workloads effectively

How many AWS Internet gateways can you define in AWS?

A.

Two per VPC

B.

Unlimited

C.

One per VPC

D.

One per Region

Which of these is true of the CloudGuard Controller?

A.

CloudGuard Controller manually updates SmartConsole security tads and API connections

B.

CloudGuard Controller only displays cloud-based Security Gateway objects

C.

CloudGuard Controller maintains visibility of the protected cloud environment

D.

CoudGuard Control statically .denies Cloud resources created within a single cloud or a multi-cloud environment.

What are two basic rules Check Point recommends for building an effective policy?

A.

Cleanup and Stealth Rule

B.

VPN and Admin Rules

C.

Implicit and Explicit Rules

D.

Access and Identity Rules

What does the Adaptive Security Policy involve to import the Data Center Objects?

A.

CloudGuard API

B.

CloudGuard Controller

C.

CloudGuard Access Control

D.

CloudGuard Gateway

What is Reliability according to the Five Pillars?

A.

The ability to use cloud resources efficiently for meeting system requirements, and maintaining that efficiency as demand changes and technologies evolve

B.

The ability of a Workload to function correctly and consistently in all expected.

C.

The ability to support development and run workload effectively

D.

In terms of the cloud, security is about architecting every workload to prevent.