In a CloudGuard deployment, what does the acronym IAM stand for?
A. Information and Adaptability Measures
B. IP Address Management
C. Identity and Access Management
D. Instant Access Management
Adaptive Security Policies allow the deployment of new cloud based resources without
A. Changing the cloud environment
B. Paying for new resources
C. Installing New Policies
D. Installing New Applications
Which software blades (Check Point features) are not are not supported in AWS?
A. IPS
B. VPN blade
C. All Check Point blades are supported
D. Mobile Access (SSLVPN)
Which of the following is a common limitation of cloud platforms?
A. Network address translations
B. Custom Route Tables
C. Identity and Access Management
D. Packet Forwarding
Which function do Load Balancers perform?
A. Trigger capacity on security gateways
B. To secure balance between private and public cloud
C. Direct internet traffic to spoke networks
D. Restrict traffic loads between servers
After the cloud acquisition process finishes. Cloud Security Posture Security module secures access to cloud environments by performing controls access to cloud environments by performing the following tasks: Visualizes Security Policies in cloud environments, control access to protected cloud assets with short-term dynamic access leases, and______________.
A. Automatically Installs Policies
B. Deploys new management resources
C. Manages Network Security Groups
D. Deploys new internal cloud resources
Which software blade provides forensic analysis tools?
A. Logging Blade
B. Identity Awareness Blade
C. Monitoring Blade
D. SmartEvent Blade
Which cloud components specify the Workloads associated with traffic and tell load balancers which Workloads are members of the same group?
A. Target Groups
B. Listening Rules
C. Dynamic assignment
D. Health Checks
Which security principles are indicative of the CloudGuard Secure Public Cloud Blueprint architecture?
A. Security with Advanced Threat Prevention; Network Division; Agility, Automation, Efficiency, and Elasticity; with Cloud Borders
B. Security with Advanced Threat Prevention Network Unification Agility Automation, Efficiency, and Elasticity; Borderless
C. Security with Advanced Threat Prevention: Network Segmentation: Agility, Automation Efficiency, and Elasticity; Borderless
D. Security with Advanced Threat Protocol; Network Distribution; Agility, Automation, Efficiency, and Cloud Rigidity Borderless
CloudGuard uses several management tools to create and manage Security Policies. Which is NOT one of those tools?
A. Gaia Portal
B. CloudGuard Controller
C. SmartConsole
D. CLI