ExamGecko
Home / Checkpoint / 156-560 / List of questions
Ask Question

Checkpoint 156-560 Practice Test - Questions Answers, Page 4

List of questions

Question 31

Report Export Collapse

One of the limitations in deploying Check Point CloudGuard Cluster High Availability is that:

State synchronization is required and must be done ONLY on a dedicated link
State synchronization is required and must be done ONLY on a dedicated link
High Availability configurations support only two Security Gateway Members
High Availability configurations support only two Security Gateway Members
High Availability configurations support only three Security Gateway members
High Availability configurations support only three Security Gateway members
VMAC mode is mandatory for all cluster interfaces
VMAC mode is mandatory for all cluster interfaces
Suggested answer: B
asked 16/09/2024
soliman sallam
44 questions

Question 32

Report Export Collapse

Which APIs are used by Public clouds and Hybrid clouds to support the interactions between cloud resources, on- premises equipment, scripts, orchestration playbooks and CloudGuard Network cloud resources, on- premise equipment, scripts.

CloudGuard Management Extension API (CME-API)
CloudGuard Management Extension API (CME-API)
CloudGuard Controller API (CG-API)
CloudGuard Controller API (CG-API)
Representational State Transfer (REST) APIs
Representational State Transfer (REST) APIs
Cloud Security Posture Management (CSPM)
Cloud Security Posture Management (CSPM)
Suggested answer: A
asked 16/09/2024
JORGE ROCHA
38 questions

Question 33

Report Export Collapse

Which scripting language is used by CloudGuard to develop templates that automate Security Gateway deployments?

Perl
Perl
C++
C++
JSON
JSON
Python
Python
Suggested answer: C
asked 16/09/2024
Borisov Aleksandr
45 questions

Question 34

Report Export Collapse

REST is an acronym for the following

Representation of Security Traffic
Representation of Security Traffic
Really Efficient Security Template
Really Efficient Security Template
Representational State Transfer
Representational State Transfer
Real Security Threat
Real Security Threat
Suggested answer: C
Explanation:

The abbreviation REST stands for "Representational State Transfer" and refers to a software architectural style. It is based on six principles that describe how networked resources are defined and addressed on the web, for example in a cloud.

asked 16/09/2024
Charles Manser
52 questions

Question 35

Report Export Collapse

Which one of the following is part of the Orchestration Playbook process for creating a new spoke and an automated Security Gateway?

Transfer of resources to a VPN
Transfer of resources to a VPN
An event trigger
An event trigger
Vertical scaling
Vertical scaling
Communication with the OS
Communication with the OS
Suggested answer: A
asked 16/09/2024
Ken Wilson
48 questions

Question 36

Report Export Collapse

What are the Automation tools?

API. CLI Scripts. Shells and Templates
API. CLI Scripts. Shells and Templates
Terraform and Ansible
Terraform and Ansible
AMIs
AMIs
CloudFormation
CloudFormation
Suggested answer: A
asked 16/09/2024
Tiffany Peterson
44 questions

Question 37

Report Export Collapse

Which of these is true of the CloudGuard Controller?

CloudGuard Controller manually updates SmartConsole security tads and API connections
CloudGuard Controller manually updates SmartConsole security tads and API connections
CloudGuard Controller only displays cloud-based Security Gateway objects
CloudGuard Controller only displays cloud-based Security Gateway objects
CloudGuard Controller maintains visibility of the protected cloud environment
CloudGuard Controller maintains visibility of the protected cloud environment
CoudGuard Control statically .denies Cloud resources created within a single cloud or a multicloud environment.
CoudGuard Control statically .denies Cloud resources created within a single cloud or a multicloud environment.
Suggested answer: D
asked 16/09/2024
claudine Nguepnang
46 questions

Question 38

Report Export Collapse

What does the Adaptive Security Policy involve to import the Data Center Objects?

CloudGuard API
CloudGuard API
CloudGuard Controller
CloudGuard Controller
CloudGuard Access Control
CloudGuard Access Control
CloudGuard Gateway
CloudGuard Gateway
Suggested answer: B
Explanation:

Checkpoint 156-560 image Question 38 explanation 12072 09162024015616000000

asked 16/09/2024
Moinuddin Mohammed
49 questions

Question 39

Report Export Collapse

Logging Implied rules, enabling Hit Count and defining advanced VPN functions are all settings that are applied as

Inline Layer
Inline Layer
Global Properties
Global Properties
Policy Settings
Policy Settings
Gateway Properties
Gateway Properties
Suggested answer: B
asked 16/09/2024
John Bocachica
49 questions

Question 40

Report Export Collapse

What are two basic rules Check Point recommends for building an effective policy?

Cleanup and Stealth Rule
Cleanup and Stealth Rule
VPN and Admin Rules
VPN and Admin Rules
Implicit and Explicit Rules
Implicit and Explicit Rules
Access and Identity Rules
Access and Identity Rules
Suggested answer: A
Explanation:

Checkpoint 156-560 image Question 40 explanation 12074 09162024015616000000

asked 16/09/2024
Thiago B
45 questions
Total 83 questions
Go to page: of 9