ExamGecko
Home Home / Checkpoint / 156-560

Checkpoint 156-560 Practice Test - Questions Answers, Page 7

Question list
Search
Search

Where can I find solution templates for Azure?

A.
On the market place
A.
On the market place
Answers
B.
In a search on the Internet
B.
In a search on the Internet
Answers
C.
At the relevant SK
C.
At the relevant SK
Answers
D.
In a special Azure page
D.
In a special Azure page
Answers
Suggested answer: D

How is CloudGuard for Azure licensed in PAYG (Pay As You Go) mode?

A.
Per hour based on resources consumed
A.
Per hour based on resources consumed
Answers
B.
Per Gateway
B.
Per Gateway
Answers
C.
Per Socket
C.
Per Socket
Answers
D.
Per vCore
D.
Per vCore
Answers
Suggested answer: A

Explanation:

Can you configure Micro segmentation (control traffic inside a subnet) on Azure?

A.
No. Micro segmentation is not supported on Azure
A.
No. Micro segmentation is not supported on Azure
Answers
B.
Yes. via UDR
B.
Yes. via UDR
Answers
C.
Yes, via System Routes
C.
Yes, via System Routes
Answers
D.
Yes, via routes on vNet
D.
Yes, via routes on vNet
Answers
Suggested answer: C

According to best practices what would be the best way to install a Check Point cluster on AWS?

A.
Following the instruction from the relevant Check Point SK
A.
Following the instruction from the relevant Check Point SK
Answers
B.
With PowerShell
B.
With PowerShell
Answers
C.
From AWS Console
C.
From AWS Console
Answers
D.
From AWS Market Place
D.
From AWS Market Place
Answers
Suggested answer: A

Why is an IAM role created when installing a cluster on AWS?

A.
In order to perform cluster related changes
A.
In order to perform cluster related changes
Answers
B.
It is created for the installation process only, it gets deleted
B.
It is created for the installation process only, it gets deleted
Answers
C.
IAM role is created for auditing purposes
C.
IAM role is created for auditing purposes
Answers
D.
IAM role is not created
D.
IAM role is not created
Answers
Suggested answer: C

Which security principles are indicative of the CloudGuard Secure Public Cloud Blueprint architecture?

A.
Security with Advanced Threat Prevention; Network Division; Agility, Automation, Efficiency, and Elasticity; with Cloud Borders
A.
Security with Advanced Threat Prevention; Network Division; Agility, Automation, Efficiency, and Elasticity; with Cloud Borders
Answers
B.
Security with Advanced Threat Prevention Network Unification Agility Automation, Efficiency, and Elasticity; Borderless
B.
Security with Advanced Threat Prevention Network Unification Agility Automation, Efficiency, and Elasticity; Borderless
Answers
C.
Security with Advanced Threat Prevention: Network Segmentation: Agility, Automation Efficiency, and Elasticity; Borderless
C.
Security with Advanced Threat Prevention: Network Segmentation: Agility, Automation Efficiency, and Elasticity; Borderless
Answers
D.
Security with Advanced Threat Protocol; Network Distribution; Agility, Automation, Efficiency, and Cloud Rigidity Borderless
D.
Security with Advanced Threat Protocol; Network Distribution; Agility, Automation, Efficiency, and Cloud Rigidity Borderless
Answers
Suggested answer: A

What is public cloud?

A.
Computing environment with limited resources
A.
Computing environment with limited resources
Answers
B.
Computing environment located over the internet
B.
Computing environment located over the internet
Answers
C.
A shared computing environment
C.
A shared computing environment
Answers
D.
Computing environment dedicated to one company
D.
Computing environment dedicated to one company
Answers
Suggested answer: A


Which software blades (Check Point features) are not are not supported in AWS?

A.
IPS
A.
IPS
Answers
B.
VPN blade
B.
VPN blade
Answers
C.
All Check Point blades are supported
C.
All Check Point blades are supported
Answers
D.
Mobile Access (SSLVPN)
D.
Mobile Access (SSLVPN)
Answers
Suggested answer: B

How does micro-segmentation create boundaries and provide network segmentation for CloudGuard?

A.
It creates borders within the cloud's perimeter to protect the major inbound and outbound traffic intersections.
A.
It creates borders within the cloud's perimeter to protect the major inbound and outbound traffic intersections.
Answers
B.
Micro-segmentation does not create boundaries.
B.
Micro-segmentation does not create boundaries.
Answers
C.
It applies a Security Gateway that enforces firewall policies to accept legitimate network traffic flows and deny unauthorized traffic
C.
It applies a Security Gateway that enforces firewall policies to accept legitimate network traffic flows and deny unauthorized traffic
Answers
D.
It places inspection points between different applications, services, and single hosts within the same network segment.
D.
It places inspection points between different applications, services, and single hosts within the same network segment.
Answers
Suggested answer: A

On Azure, can you deploy a Check Point Standalone installation (Management + GW)?

A.
No. it is not supported
A.
No. it is not supported
Answers
B.
Yes, via GitHub only
B.
Yes, via GitHub only
Answers
C.
Yes. via PowerShell only
C.
Yes. via PowerShell only
Answers
D.
Yes, via solution template / PowerShell / Marketplace
D.
Yes, via solution template / PowerShell / Marketplace
Answers
Suggested answer: D
Total 83 questions
Go to page: of 9