ExamGecko
Home Home / Checkpoint / 156-560

Checkpoint 156-560 Practice Test - Questions Answers, Page 4

Question list
Search
Search

One of the limitations in deploying Check Point CloudGuard Cluster High Availability is that:

A.
State synchronization is required and must be done ONLY on a dedicated link
A.
State synchronization is required and must be done ONLY on a dedicated link
Answers
B.
High Availability configurations support only two Security Gateway Members
B.
High Availability configurations support only two Security Gateway Members
Answers
C.
High Availability configurations support only three Security Gateway members
C.
High Availability configurations support only three Security Gateway members
Answers
D.
VMAC mode is mandatory for all cluster interfaces
D.
VMAC mode is mandatory for all cluster interfaces
Answers
Suggested answer: B

Which APIs are used by Public clouds and Hybrid clouds to support the interactions between cloud resources, on- premises equipment, scripts, orchestration playbooks and CloudGuard Network cloud resources, on- premise equipment, scripts.

A.
CloudGuard Management Extension API (CME-API)
A.
CloudGuard Management Extension API (CME-API)
Answers
B.
CloudGuard Controller API (CG-API)
B.
CloudGuard Controller API (CG-API)
Answers
C.
Representational State Transfer (REST) APIs
C.
Representational State Transfer (REST) APIs
Answers
D.
Cloud Security Posture Management (CSPM)
D.
Cloud Security Posture Management (CSPM)
Answers
Suggested answer: A

Which scripting language is used by CloudGuard to develop templates that automate Security Gateway deployments?

A.
Perl
A.
Perl
Answers
B.
C++
B.
C++
Answers
C.
JSON
C.
JSON
Answers
D.
Python
D.
Python
Answers
Suggested answer: C

REST is an acronym for the following

A.
Representation of Security Traffic
A.
Representation of Security Traffic
Answers
B.
Really Efficient Security Template
B.
Really Efficient Security Template
Answers
C.
Representational State Transfer
C.
Representational State Transfer
Answers
D.
Real Security Threat
D.
Real Security Threat
Answers
Suggested answer: C

Explanation:

The abbreviation REST stands for "Representational State Transfer" and refers to a software architectural style. It is based on six principles that describe how networked resources are defined and addressed on the web, for example in a cloud.

Which one of the following is part of the Orchestration Playbook process for creating a new spoke and an automated Security Gateway?

A.
Transfer of resources to a VPN
A.
Transfer of resources to a VPN
Answers
B.
An event trigger
B.
An event trigger
Answers
C.
Vertical scaling
C.
Vertical scaling
Answers
D.
Communication with the OS
D.
Communication with the OS
Answers
Suggested answer: A

What are the Automation tools?

A.
API. CLI Scripts. Shells and Templates
A.
API. CLI Scripts. Shells and Templates
Answers
B.
Terraform and Ansible
B.
Terraform and Ansible
Answers
C.
AMIs
C.
AMIs
Answers
D.
CloudFormation
D.
CloudFormation
Answers
Suggested answer: A

Which of these is true of the CloudGuard Controller?

A.
CloudGuard Controller manually updates SmartConsole security tads and API connections
A.
CloudGuard Controller manually updates SmartConsole security tads and API connections
Answers
B.
CloudGuard Controller only displays cloud-based Security Gateway objects
B.
CloudGuard Controller only displays cloud-based Security Gateway objects
Answers
C.
CloudGuard Controller maintains visibility of the protected cloud environment
C.
CloudGuard Controller maintains visibility of the protected cloud environment
Answers
D.
CoudGuard Control statically .denies Cloud resources created within a single cloud or a multicloud environment.
D.
CoudGuard Control statically .denies Cloud resources created within a single cloud or a multicloud environment.
Answers
Suggested answer: D

What does the Adaptive Security Policy involve to import the Data Center Objects?

A.
CloudGuard API
A.
CloudGuard API
Answers
B.
CloudGuard Controller
B.
CloudGuard Controller
Answers
C.
CloudGuard Access Control
C.
CloudGuard Access Control
Answers
D.
CloudGuard Gateway
D.
CloudGuard Gateway
Answers
Suggested answer: B

Explanation:

Logging Implied rules, enabling Hit Count and defining advanced VPN functions are all settings that are applied as

A.
Inline Layer
A.
Inline Layer
Answers
B.
Global Properties
B.
Global Properties
Answers
C.
Policy Settings
C.
Policy Settings
Answers
D.
Gateway Properties
D.
Gateway Properties
Answers
Suggested answer: B

What are two basic rules Check Point recommends for building an effective policy?

A.
Cleanup and Stealth Rule
A.
Cleanup and Stealth Rule
Answers
B.
VPN and Admin Rules
B.
VPN and Admin Rules
Answers
C.
Implicit and Explicit Rules
C.
Implicit and Explicit Rules
Answers
D.
Access and Identity Rules
D.
Access and Identity Rules
Answers
Suggested answer: A

Explanation:

Total 83 questions
Go to page: of 9