ExamGecko
Home Home / Checkpoint / 156-560

Checkpoint 156-560 Practice Test - Questions Answers, Page 3

Question list
Search
Search

Which function do Load Balancers perform?

A.
Trigger capacity on security gateways
A.
Trigger capacity on security gateways
Answers
B.
To secure balance between private and public cloud
B.
To secure balance between private and public cloud
Answers
C.
Direct internet traffic to spoke networks
C.
Direct internet traffic to spoke networks
Answers
D.
Restrict traffic loads between servers
D.
Restrict traffic loads between servers
Answers
Suggested answer: B

A utility that allows integration between SMS, the CloudGuard Network Solution, and CSPs, allowing the SMS to monitor and control scaling solutions in their associated cloud environments is called

A.
CloudGuard Management Extension (CME)
A.
CloudGuard Management Extension (CME)
Answers
B.
CloudGuard Controller and Enforcer (CCE)
B.
CloudGuard Controller and Enforcer (CCE)
Answers
C.
CloudGuard Scanner and Enforcer (CSE)
C.
CloudGuard Scanner and Enforcer (CSE)
Answers
D.
CloudGuard Controller (CC)
D.
CloudGuard Controller (CC)
Answers
Suggested answer: A

CloudGuard uses several management tools to create and manage Security Policies. Which is NOT one of those tools?

A.
Gaia Portal
A.
Gaia Portal
Answers
B.
CloudGuard Controller
B.
CloudGuard Controller
Answers
C.
SmartConsole
C.
SmartConsole
Answers
D.
CLI
D.
CLI
Answers
Suggested answer: D

Which Security Gateway function inspects cloud applications and workload resources for malicious activity?

A.
Application Control
A.
Application Control
Answers
B.
Threat Prevention
B.
Threat Prevention
Answers
C.
Identity Awareness
C.
Identity Awareness
Answers
D.
Access Control
D.
Access Control
Answers
Suggested answer: B

Which of these Cloud Platforms support User Defined Route (UDR) to force traffic destined for spoke networks to go through a network virtual appliance

A.
Amazon AWS
A.
Amazon AWS
Answers
B.
Google Cloud Platform
B.
Google Cloud Platform
Answers
C.
Amazon AWS and Google Cloud Platform
C.
Amazon AWS and Google Cloud Platform
Answers
D.
Microsoft Azure
D.
Microsoft Azure
Answers
Suggested answer: D

The best practice for CloudGuard Network deployments utilizes the Hub and Spokes Model. Which of these statements is the most correct for this model.

A.
All the security components including SMS, Northbound and Southbound Security Gateways and East-West VPN Gateways will be deployed in one Hub.
A.
All the security components including SMS, Northbound and Southbound Security Gateways and East-West VPN Gateways will be deployed in one Hub.
Answers
B.
A Spoke can ONLY consist of a single virtual machine in a dedicated subnet shared between the VM and the Hub.
B.
A Spoke can ONLY consist of a single virtual machine in a dedicated subnet shared between the VM and the Hub.
Answers
C.
All traffic that enters and exits each spoke must travel through a hub
C.
All traffic that enters and exits each spoke must travel through a hub
Answers
D.
The Hub and Spoke model is applicable ONLY to multi-cloud environments. The Hub includes all the Security Gateways in all cloud environment. Each Spoke includes all resources of a Data Center in a single Cloud Environment.
D.
The Hub and Spoke model is applicable ONLY to multi-cloud environments. The Hub includes all the Security Gateways in all cloud environment. Each Spoke includes all resources of a Data Center in a single Cloud Environment.
Answers
Suggested answer: A

Check Point’s Public Cloud model is described as the following

A.
A Security Matrix Model
A.
A Security Matrix Model
Answers
B.
A Hub and Spoke Model
B.
A Hub and Spoke Model
Answers
C.
An Advanced Threat Tunnel Model
C.
An Advanced Threat Tunnel Model
Answers
D.
A Borderless Model
D.
A Borderless Model
Answers
Suggested answer: B

Which is not a deployment method for CloudGuard solutions using

A.
Terraform
A.
Terraform
Answers
B.
Shell
B.
Shell
Answers
C.
CLI
C.
CLI
Answers
D.
CPS Portal
D.
CPS Portal
Answers
Suggested answer: A

What is an alternative method to double NAT in Azure?

A.
Scaling
A.
Scaling
Answers
B.
System Routes
B.
System Routes
Answers
C.
Peering
C.
Peering
Answers
D.
User Defined Routes
D.
User Defined Routes
Answers
Suggested answer: C

To travel between spokes, non-transitive traffic uses ________ to allow Ipv4 and IPv6 traffic to reach a spoke network

A.
a VTI
A.
a VTI
Answers
B.
the Northbound hub
B.
the Northbound hub
Answers
C.
the Southbound hub
C.
the Southbound hub
Answers
D.
Peering
D.
Peering
Answers
Suggested answer: D
Total 83 questions
Go to page: of 9