1
Adaptive Security Policies allow the deployment of new cloud based resources without
Installing New Applications
Paying for new resources
Installing New Policies
Changing the cloud environment
2
Adding new Security Gateways as system load increases is an example of __________
Network Scaling
Vertical Scaling
Horizontal Scaling
System Scaling
3
Which autoscaling method requires the VM to temporarily shut down while it processes system modification?
Both Vertical and Horizontal Scaling
Vertical Scaling
Neither autoscaling method requires the VM to
Horizontal Scaling
4
Which function do Load Balancers perform?
Restrict traffic loads between servers
Trigger capacity on security gateways
To secure balance between private and public cloud
Direct internet traffic to spoke networks
5
A utility that allows integration between SMS, the CloudGuard Network Solution, and CSPs, allowing the SMS to monitor and control scaling solutions in their associated cloud environments is called
CloudGuard Controller (CC)
CloudGuard Management Extension (CME)
CloudGuard Scanner and Enforcer (CSE)
CloudGuard Controller and Enforcer (CCE)
6
CloudGuard uses several management tools to create and manage Security Policies. Which is NOT one of those tools?
Gaia Portal
SmartConsole
CLI
CloudGuard Controller
7
Which Security Gateway function inspects cloud applications and workload resources for malicious activity?
Access Control
Threat Prevention
Application Control
Identity Awareness
8
Which of these Cloud Platforms support User Defined Route (UDR) to force traffic destined for spoke networks to go through a network virtual appliance?
Microsoft Azure
Google Cloud Platform
Amazon AWS
Amazon AWS and Google Cloud Platform
9
The best practice for CloudGuard Network deployments utilizes the Hub and Spokes Model.Which of these statements is the most correct for this model.
All traffic that enters and exits each spoke must travel through a hub.
All the security components including SMS, Northbound and Southbound Security Gateways and East-West VPN Gateways will be deployed in one Hub.
A Spoke can ONLY consist of a single virtual machine in a dedicated subnet shared between the VM and the Hub.
The Hub and Spoke model is applicable ONLY to multi-cloud environments. The Hub includes all the Security Gateways in all cloud environment. Each Spoke includes all resources of a Data Center in a single Cloud Environment.
10
Check Point's Public Cloud model is described as the following
A Borderless Model
A Security Matrix Model
A Hub and Spoke Model
An Advanced Threat Tunnel Model
11
Which is not a deployment method for CloudGuard solutions using
CPS Portal
CLI
Shell
Terraform
12
What is an alternative method to double NAT in Azure?
User Defined Routes
Scaling
Peering
System Routes
13
To travel between spokes, non-transitive traffic uses ________ to allow IPv4 and IPv6 traffic to reach a spoke network
the Northbound hub
Peering
a VTI
the Southbound hub
14
One of the limitations in deploying Check Point CloudGuard Cluster High Availability is that:
High Availability configurations support only two Security Gateway Members
State synchronization is required and must be done ONLY on a dedicated link
High Availability configurations support only three Security Gateway members
VMAC mode is mandatory for all cluster interfaces
15
Which APIs are used by Public clouds and Hybrid clouds to support the interactions between cloud resources, on-premises equipment, scripts, orchestration playbooks and CloudGuard Network cloud resources, on-premise equipment, scripts.
Representational State Transfer (REST) APIs
CloudGuard Management Extension API (CME-API)
Cloud Security Posture Management (CSPM)
CloudGuard Controller API (CG-API)
16
Which scripting language is used by CloudGuard to develop templates that automate Security Gateway deployments?
Python
C++
Perl
JSON
17
REST is an acronym for the following
Representation of Security Traffic
Really Efficient Security Template
Real Security Threat
Representational State Transfer
18
Which one of the following is part of the Orchestration Playbook process for creating a new spoke and an automated Security Gateway?
Transfer of resources to a VPN
An event trigger
Vertical scaling
Communication with the OS
19
What are the Automation tools?
Terraform and Ansible
AMls
API, CLI, Scripts, Shells and Templates
CloudFormation
20
Which of these is true of the CloudGuard Controller?
CloudGuard Controller manually updates SmartConsole security tads and API connections
CoudGuard Control statically .denies Cloud resources created within a single cloud or a multi-cloud environment.
CloudGuard Controller maintains visibility of the protected cloud environment
CloudGuard Controller only displays cloud-based Security Gateway objects
21
What does the Adaptive Security Policy involve to import the Data Center Objects?
CloudGuard API
CloudGuard Controller
CloudGuard Gateway
CloudGuard Access Control
22
Logging Implied rules, enabling Hit Count and defining advanced VPN functions are all settings that are applied as
Global Properties
Gateway Properties
Inline Layer
Policy Settings
23
What are two basic rules Check Point recommends for building an effective policy?
Implicit and Explicit Rules
VPN and Admin Rules
Cleanup and Stealth Rule
Access and Identity Rules
24
What is the key component in securing and managing any environment?
Security Policy
Security Management Server
Security Access
Security Gateway
25
What can Data Center Objects represent?
Cloud Data Center. Tags, subnets, or hosts
vNets. VPCs or Network Security Groups
Public IP. Private IP NAT or IAM roles
Compute. Regions or Availability Zones
26
An organization is using an adaptive security policy where a Data Center Object was imported and used in some rules. When the cloud resource represented by this object changes it's IP address, how will the change be effected on the Security Gateway
The Data Center Object needs to be refreshed in the SmartCansoIe and then a policy install will be required
The change is automatically updated to the Security Management Server and so only a policy install from SmartConsole or with API will be required
If CloudGuard Controller is enabled on the Security Gateway, the gateway will connect with the Cloud account and synchronize all the Data Center Objects used on
With a property functioning configuration, the change will automatically be done on the Security Gateway without any action required by the administrator
27
What can a Security Admin do in a situation where collecting additional log file information to examine a CloudGuard Controller issue is required?
Set the operation to TRACE to collect more data.
Execute a debug on the SMS
Verify connectivity between the SMS and the SDDC.
Search for the information in the objects database.
28
Deployment of a Security Gateway was initiated on AWS using a CloudFormation Template available through sk111013. The deployment process, after a while failed and rolled back. What could be the probable cause of this failure and roll back?
The Security Management Server that will be managing the Security Gateway had a lower version
The web browser used to run the template was not compatible
The specific software being deployed was not subscribed to in the AWS Marketplace Subscriptions
The template used was for some cloud platform other than AWS
29
To troubleshoot CloudGuard Controller, administrators can execute the following command:
cloudguard on
cloudguard troubleshoot
cloudguard security
cloudguard off
30
Where are the api logs found on the Security Management Server?
/var/log/api.elg
/opt/log/api.elg
$FWDIR/Iog/api.elg
/var/tmp/api.elg
31
Which command will enable the CloudGuard Controller services on the Security Management Server?
set cgcontroller on
cloudguard on
set cgcontroller state on
controller on
32
The Security Administrator needs to reconfigure the API server, which command would need to
api reboot
api reconfig
api restart
api reconf
33
How does the Cloud Security Posture Management (CSPM) service deliver intelligence threat feeds, enforce compliance policies, and apply security enhancement to the environment.
The Cloud Security Posture Management (CSPM) does this by .usingSSH and microagents
The Cloud Security Posture Management (CSPM) does this by using the SOAP protocol and XML
The Cloud Security Posture Management (CSPM) does this by using SIC connections on the cloud
The Cloud Security Posture Management (CSPM) does this by using REST APIs
34
Cloud Security Posture Management uses CloudBots to assist with________________.
automatic compliance remediation
identifying where the organization's security posture need:
cloud account configurations and data flows
securing IAM account credentials.
35
Which CloudGuard security platform enables organizations to view and access their security posture, find cloud misconfigurations, and enforce best practices?
CloudGuard laaS Private Cloud Solution
CloudGuard Security Posture Management
CloudGuard SaaS
CloudGuard laaS Public Cloud Solution
36
When Cloud Security Posture Management discovers non-compliant cloud resources, CloudBot applications perform automated remediation's to correct any violations. How true is this statement?
This is true, however it requires Full Protection access to the Cloud Account to perform automated remediation
This is not true, Cloud Security Posture Management (CSPIU) can only report non-compliance and cannot remediate by itself
This is partially true, however the automated remediation is not done by CloudBot applications but it is done by the Security Management Server
This is not true because CloudBot applications are used to provide chat service to respond to non-compliance alerts
37
Once the Deployment finishes, Cloud Security Posture Management applies default network security posture that does what?
Minimizes the risks of external threats by blocking access to services and ports
Minimizes the risk of external threats by blocking accessed to the internet
Minimizes the risk of external threats by blocking access to high risk sites and external users
Minimizes the risk of external threats by blocking access to all internal resources
38
Introduction to Cloud Security Posture Management uses which of the following to connect, communicate, and collect information from cloud accounts and third party tools?
APIs
CLI
SmartConsole
HTML
39
Cloud Security Posture Management (CSPM) operates as which type of service based platform?
PaaS
SaaS
CaaS
laaS
40
What platform provides continuous compliance and governance assessments that evaluate public infrastructure according to industry standards and best practices?
CloudGuard SaaS
CloudGuard laaS Public Cloud
Cloud Security Posture Management
CloudGuard laaS Private Cloud
41
After the cloud acquisition process finishes. Cloud Security Posture Security module secures access to cloud environments by performing controls access to cloud environments by performing the following tasks: Visualizes Security Policies in cloud environments, control access to protected cloud assets with short-term dynamic access leases, and______________.
Manages Network Security Groups
Deploys new internal cloud resources
Automatically Installs Policies
Deploys new management resources
42
Cloud Security Posture Management uses which one of the following to integrate with cloud accounts?
SDDC
Security Objects
CloudGuard Controller
IAM account credentials
43
Cloud Security Posture Management operational modes for cloud accounts are:
Read Only, Read/Write, Region Lock
Read/Write, Partial Protection, Full Protection
Read Only, Read/Write, Full Protection
Read Only, Full Protection, Region Lock
44
Where can I find solution templates for Azure?
In a special Azure page
On the market place
At the relevant SK
In a search on the Internet
45
How is CloudGuard for Azure licensed in PAYG (Pay As You Go) mode?
Per Socket
Per hour based on resources consumed
Per Gateway
Per vCore
46
Can you configure Micro segmentation (control traffic inside a subnet) on Azure?
Yes, via System Routes
No. Micro segmentation is not supported on Azure
Yes, via routes on vNet
Yes, via UDR
47
According to best practices what would be the best way to install a Check Point cluster on AWS?
From AWS Console
With PowerShell
Following the instruction from the relevant Check Point SK
From AWS Market Place
48
What is public cloud?
A shared computing environment
Computing environment with limited resources
Computing environment located over the internet
Computing environment dedicated to one company
49
Which software blades (Check Point features) are not are not supported in AWS?
Mobile Access (SSLVPN)
IPS
VPN blade
All Check Point blades are supported
50
How does micro-segmentation create boundaries and provide network segmentation for CloudGuard?
It applies a Security Gateway that enforces firewall policies to accept legitimate network traffic flows and deny unauthorized traffic
Micro-segmentation does not create boundaries.
It creates borders within the cloud's perimeter to protect the major inbound and outbound traffic intersections.
It places inspection points between different applications, services, and single hosts within the same network segment.
51
On Azure, can you deploy a Check Point Standalone installation (Management + GW)?
No. it is not supported
Yes. via PowerShell only
Yes, via solution template / PowerShell / Marketplace
Yes, via GitHub only
52
How many AWS Internet gateways can you define in AWS?
Two per VPC
One per Region
Unlimited
One per VPC
53
How is CloudGuard for Azure licensed in BYOL (Bring your own license) mode?
Per usage
Per Socket
Per Gateway
Per vCore
54
Can you configure NAT for internal VM's on the Check Point Gateway in AWS?
No. ail the NAT is being done by the ELB
No, the public IPs are defined directly on the in
Yes, the NAT is only defined for internal LB
Yes, you can add public IP's to the Check Point
55
What is the CloudGuard solution?
Check Point virtual gateway
Check Point solution for private cloud
Check Point solution for public cloud
Check Point solution for private and public cloud
56
When using system routes and user defined routes in Azure, which takes precedent?
The most specific route takes precedent
The newest route takes precedent
The user defined route takes precedent
The system route always takes precedent
57
Which is not a responsibility of the Customer?
Service, Communication, and Data Security
Infrastructure Patching and Configuration
Customer Employee Training
Guest OS and Application Patching and Configuration
58
What is the primary difference between Vertical and Horizontal autoscaling?
Vertical scaling requires a virtual machine to completely shut down as opposed to horizontal scaling transferring resources without having to power down the VM.
Vertical scaling doesn't require moving resources but horizontal scaling does.
Vertical scaling is linear and horizontal scaling goes across.
Vertical scaling is automatic and horizontal scaling is manual.
59
What part of the Secure Public Cloud Blueprint may be housed in on-premises equipment?
Security Management Server
Peering Connection
Security Gateway
Application Server
60
Which utility allows integration between the Check Point Security Management Server, the CloudGuard Network solution, and the CSPs?
CloudGuard Controller
Elastic Licensing
CloudGuard Management Extension
Maestro
61
Security Management Servers deployed in a cloud environment can manage which of the following gateways?
Only CloudGuard IaaS Security Gateways
On-Prem Security Gateways and CloudGuard IaaS Security Gateways on multiple CSP's
Only Security Gateways with the CloudGuard Controller installed
Physical Security Gateways and CloudGuard IaaS Security Gateways
62
Automated Security Policy enforcement requires coordinated effort between the Security Management Server, the Security Gateway and:
The SmartEvent Server
The Cloud Service Provider
The Application Server
CloudGuard Controller
63
How many gateways are supported in a High Availability solution?
4
1
3
2
64
What do Workloads require to automate processes?
API
CLI
CSP Portal
Shell
65
Clouds use orchestration platforms to accomplish various deployment tasks. Which of the following is NOT one of those tasks?
Deploying endpoint security devices.
Deploying environments with complex dependencies.
Deploying multiple data centers.
Deploying clustered applications.
66
What is a Security Zone?
A Security Zone is the subnet of each of the firewall's interfaces. All other Spoke networks are peered with the Security Zone network.
A Security Zone is the network in which the Security Management and SmartConsole are deployed. This can be in one of the Spoke networks on the Cloud or it can be in on-premise network
A Security Zone is a group of one or more network interfaces from different centrally managed gateways bound together and used directly in the Rulebase. It allows administrators to define the Security Policy based on network interfaces rather than IP addresses.
A Cloud Service Provider (CSP) provides a network zone to deploy virtual security device.
CloudGuard Security Gateways and Security Management Servers are deploying in this
Security Zone so that they are protected from the rest of the world.
67
In Amazon Web Services, what is the level of segmentation you can achieve?
VM to VM (micro segmentation) and Internet to VPC
VPC to VPC and VM to VM (micro segmentation)
VPC to VPC only
Internet to VPC, VPC to VPC and Subnet to Subnet
68
Can you change the Check Point prepared solution templates for Azure to fit your needs?
Yes you can
No, altering the solution template is forbidden by Azure
Yes but only the number vNics
No, Check Point policy forbids the change of the templates
69
On Azure, can you deploy a Check Point Standalone installation (Management + GW)?
Yes, via solution template / PowerShell / Marketplace
Yes, via GitHub only
Yes, via PowerShell only
No, it is not supported
70
Which of the following is the Customer's Responsibility in the shared responsibility model used in the cloud?
Customer Employee Training
Infrastructure Configuration
Infrastructure Patching
Physical and Environment Controls
71
Which of the following is a common limitation of cloud platforms?
Packet Forwarding
Identity and Access Management
Network address translations
Custom Route Tables
72
Which Pillar includes the following principals? - Experiment more often - Go Global in minutes - Use serverless architectures
Reliability
Operational Excellence
Performance Efficiency
Cost Optimization
73
The ability to support development and run workloads effectively is commonly called:
Reliability
Cost Optimization
Performance Efficiency
Operational Excellence
74
The framework for cloud security consists of five basic components, or pillars Making small, reversible changes is a design principle of which of these five pillars?
Cost Optimization
Reliability
Operational Excellence
Performance Efficiency
75
The Administrators ability to protect data, systems, and assets While taking advantage of cloud technologies is commonly called
Security
Cost Optimization
Operational Excellence
Performance Efficiency
76
What is Operational Excellence?
In terms of the cloud, security is about architecting every workload to prevent
The ability to use cloud resources efficiently for meeting system requirements, and maintaining that efficiency as demand changes and technologies evolve
The ability of a Workload to function correctly and consistently in all expected
The ability to support development and run workloads effectively
77
What is Reliability according to the Five Pillars?
The ability to support development and run workload effectively
The ability of a Workload to function correctly and consistently in all expected.
In terms of the cloud, security is about architecting every workload to prevent.
The ability to use cloud resources efficiently for meeting system requirements, and maintaining that efficiency as demand changes and technologies evolve
78
Which is not a Pillar of the Framework for the Cloud?
Scalability
Performance Efficiency
Cost Optimization
Reliability
79
When choosing PAYG (Pay As You Go) licensing in AWS, it is provided:
Via specific dedicated channels
At the marketplace
Directly with Check Point
Through the regular Check Point channels
80
Which solution delivers a software platform for public cloud security and compliance orchestration?
Cloud Security Posture Management
CloudGuard Network Public
CloudGuard SaaS
CloudGuard Network Private
81
Which language can be used by users of Cloud Security Posture Management to create custom Security Policies?
Posture Management Language (PML)
JavaScript Object Notation (JSON)
eXtensible Markup Language (XML)
Governance Specific Language (GSL)
82
When using Data Center Objects in a policy and the objects are not updating, what are two steps we can check?
1. Reboot the Security Management Server and 2. restart the api process with 'api restart'
1. Reboot the Security Management Server and 2. restart the cloudguard process with 'cloudguard on'
1. Verify process is running with 'cloudguard on' and 2. restart the api process with 'api restart'
1. Verify process is running with 'cloudguard on' and 2. 'test communication' button the Data Center Server object
83
Which log file should an administrator gather to expedite the diagnosis of a CloudGuard Controller issue?
$DADIR/logs/controller_proxy.elg
$FWDIR/logs/cloud_proxy.elg
$FWDIR/logs/cloud_controller.elg
$CPDIR/logs/cloud.elg
84
Which hub serves as the front end of the Workload that permits inbound web communications such as HTTP traffic from the Internet to reach spoke Workloads?
Southbound Hub
Northbound Hub
Web Hub
East-West Hub
85
What are the languages supported for Cloud Templates?
YAML and Python
Python and PERL
JSON and Python
JSON and YAML
86
One of the five pillars of the framework for cloud security is 'Performance Efficiency'. The design principles of Performance Efficiency include:
Go Global in minutes / Use serverless architectures
Automatically recover from failure / Test recovery procedures
Adopt a consumption model / Measure overall efficiency
Apply security at all layers / Automate security best practices
87
What is Cost Optimization?
The ability to support development and run workloads effectively
The ability of a Workload to function correctly and consistently in all expected
In terms of the cloud, security is about architecting every workload to prevent
The ability of the system to deliver business value at the lowest cost point
88
Which is not a cloud component?
Compute
Identity and Access Management
Marketplace
VLAN
89
What is Performance Efficiency?
The ability to use cloud resources efficiently for meeting system requirements, and maintaining that efficiency as demand changes and technologies evolve
The ability of a Workload to function correctly and consistently in all expected
In terms of the cloud, security is about architecting every workload to prevent
The ability to support development and run workloads effectively
90
What is Cloud Security according to the Five Pillars?
In terms of tie cloud, security is about architecting every workload to prevent
The ability to support development and run workloads effectively
The ability of a Workload to function correctly and consistently in all expected
The ability to use cloud resources efficiently for meeting system requirements, and maintaining that efficiency as demands changes and technologies evolve
91
In a CloudGuard deployment, what does the acronym IAM stand for?
Instant Access Management
IP Address Management
Information and Adaptability Measures
Identity and Access Management
92
Which cloud components specify the Workloads associated with traffic and tell load balancers which Workloads are members of the same group?
Listening Rules
Target Groups
Health Checks
Dynamic assignment
93
Which pricing model gives administrators the ability to deploy devices as needed without the need to purchase blocks of vCore licenses?
Central licensing
Bring Your Own License
Local licensing
Pay As You Go
94
The integration of cloud resources into the Security Policy requires establishing a secure connection between_________________
CloudGuard Security Gateways and the Security Management Server
The SDDC and the Security Management Server
The SDDC and CloudGuard Security Gateways.
The SDDC, CloudGuard Security Gateways, and the Security Management Server
95
What is vertical scaling?
Tunes the environment by manually adding or removing resource to an SDDC
Tunes the environment by automatically adding or removing resource to the SDN
Scaling method that does not require a system shutdown to add or remove resources
Tunes the environment up and down according to the resource capacity needs
96
Which software blade provides forensic analysis tools?
Logging Blade
SmartEvent Blade
Monitoring Blade
Identity Awareness Blade
97
Which of these is an example of Control Connections as accepted with implicit rules enabled from Global Properties?
Communication with various types of servers, such as RADIUS, CVP, UFP, TACACS, LDAP and logical servers, even if these servers are not specifically defined resources in your Security Policy.
Communication using any protocol that can be used to control a remote host machine e.g. SSH, Telnet, RDP, etc.
Any TCP or UDP communication from the Primary SMS to any managed Security Gateway.
Cluster Control Protocol (CCP) communication between members of a Security Gateway Cluster.
98
What tool can prevent intruders from using altered packet IP Addresses to gain access to internal network resources?
Anti-Spoofing
Security Zones
Scavenging
Default Rules
99
The Cloud Security Posture Management platform uses REST API calls to carry out the following procedures EXCEPT:
Deploy agents to each resource in each region
Remediate non-compliant cloud resources with Cloudbots
Run the compliance engine and Security Policy groups
Manage locking and unlocking cloud-based Security Groups and regions
100
On Public Cloud, what is included in the BYOL (Bring your own license) package?
Perpetual licenses for Software only
1 year subscription includes: Software, Services & Support
1 year subscription for Services & Support
Perpetual licenses for Software & Services