ExamGecko
Home Home / Checkpoint / 156-560

Checkpoint 156-560 Practice Test - Questions Answers, Page 2

Question list
Search
Search

What is Cloud Security according to the Five Pillars?

A.
The ability to support development and run workloads effectively
A.
The ability to support development and run workloads effectively
Answers
B.
The ability of a Workload to function correctly and consistently in all expected
B.
The ability of a Workload to function correctly and consistently in all expected
Answers
C.
The ability to use cloud resources efficiently for meeting system requirements, and maintaining that efficiency as demands changes and technologies evolve
C.
The ability to use cloud resources efficiently for meeting system requirements, and maintaining that efficiency as demands changes and technologies evolve
Answers
D.
In terms of tie cloud, security is about architecting every workload to prevent
D.
In terms of tie cloud, security is about architecting every workload to prevent
Answers
Suggested answer: D

In a CloudGuard deployment, what does the acronym IAM stand for?

A.
Information and Adaptability Measures
A.
Information and Adaptability Measures
Answers
B.
IP Address Management
B.
IP Address Management
Answers
C.
Identity and Access Management
C.
Identity and Access Management
Answers
D.
Instant Access Management
D.
Instant Access Management
Answers
Suggested answer: C

Which cloud components specify the Workloads associated with traffic and tell load balancers which Workloads are members of the same group?

A.
Target Groups
A.
Target Groups
Answers
B.
Listening Rules
B.
Listening Rules
Answers
C.
Dynamic assignment
C.
Dynamic assignment
Answers
D.
Health Checks
D.
Health Checks
Answers
Suggested answer: A

Which pricing model gives administrators the ability to deploy devices as needed without the need to purchase blocks of vCore licenses?

A.
Pay As You Go
A.
Pay As You Go
Answers
B.
Bring Your Own License
B.
Bring Your Own License
Answers
C.
Central licensing
C.
Central licensing
Answers
D.
Local licensing
D.
Local licensing
Answers
Suggested answer: A

The integration of cloud resources into the Security Policy requires establishing a secure connection between_________________

A.
The SDDC, CloudGuard Security Gateways, and the Security Management Server
A.
The SDDC, CloudGuard Security Gateways, and the Security Management Server
Answers
B.
The SDDC and CloudGuard Security Gateways.
B.
The SDDC and CloudGuard Security Gateways.
Answers
C.
The SDDC and the Security Management Server
C.
The SDDC and the Security Management Server
Answers
D.
CloudGuard Security Gateways and the Security Management Server
D.
CloudGuard Security Gateways and the Security Management Server
Answers
Suggested answer: A

What is vertical scaling?

A.
Tunes the environment up and down according to the resource capacity needs
A.
Tunes the environment up and down according to the resource capacity needs
Answers
B.
Tunes the environment by automatically adding or removing resource to the SDN
B.
Tunes the environment by automatically adding or removing resource to the SDN
Answers
C.
Tunes the environment by manually adding or removing resource to an SDDC
C.
Tunes the environment by manually adding or removing resource to an SDDC
Answers
D.
Scaling method that does not require a system shutdown to add or remove resources.
D.
Scaling method that does not require a system shutdown to add or remove resources.
Answers
Suggested answer: A

Which software blade provides forensic analysis tools?

A.
Logging Blade
A.
Logging Blade
Answers
B.
Identity Awareness Blade
B.
Identity Awareness Blade
Answers
C.
Monitoring Blade
C.
Monitoring Blade
Answers
D.
SmartEvent Blade
D.
SmartEvent Blade
Answers
Suggested answer: B

Adaptive Security Policies allow the deployment of new cloud based resources without

A.
Changing the cloud environment
A.
Changing the cloud environment
Answers
B.
Paying for new resources
B.
Paying for new resources
Answers
C.
Installing New Policies
C.
Installing New Policies
Answers
D.
Installing New Applications
D.
Installing New Applications
Answers
Suggested answer: C

Adding new Security Gateways as system load increases is an example of __________

A.
Vertical Scaling
A.
Vertical Scaling
Answers
B.
Network Scaling
B.
Network Scaling
Answers
C.
Horizontal Scaling
C.
Horizontal Scaling
Answers
D.
System Scaling
D.
System Scaling
Answers
Suggested answer: C

Which autoscaling method requires the VM to temporarily shut down while it processes system modification?

A.
Both Vertical and Horizontal Scaling
A.
Both Vertical and Horizontal Scaling
Answers
B.
Vertical Scaling
B.
Vertical Scaling
Answers
C.
Horizontal Scaling
C.
Horizontal Scaling
Answers
D.
Neither autoscaling method requires the VM to}
D.
Neither autoscaling method requires the VM to}
Answers
Suggested answer: B
Total 83 questions
Go to page: of 9