156-560: Check Point Certified Cloud Specialist (CCCS) Part 1
Question #: 1
Topic #: 1
What is Cost Optimization?
A. The ability of the system to deliver business value at the lowest cost point
B. In terms of the cloud, security is about architecting every workload to prevent
C. The ability of a Workload to function correctly and consistently in all expected
D. The ability to support development and run workloads effectively
Selected Answer: A
———————————————————————-
Question #: 2
Topic #: 1
What is Operational Excellence?
A. The ability of a Workload to function correctly and consistently in all expected
B. In terms of the cloud, security is about architecting every workload to prevent
C. The ability to use cloud resources efficiently for meeting system requirements, and maintaining that efficiency as demand changes and technologies evolve
D. The ability to support development and run workloads effectively
Selected Answer: D
———————————————————————-
Question #: 3
Topic #: 1
What is Reliability according to the Five Pillars?
A. The ability to use cloud resources efficiently for meeting system requirements, and maintaining that efficiency as demand changes and technologies evolve
B. The ability of a Workload to function correctly and consistently in all expected
C. The ability to support development and run workloads effectively
D. In terms of the cloud, security is about architecting every workload to prevent
Selected Answer: B
———————————————————————-
Question #: 4
Topic #: 1
In a CloudGuard deployment, what does the acronym IAM stand for?
A. Information and Adaptability Measures
B. IP Address Management
C. Identity and Access Management
D. Instant Access Management
Selected Answer: C
———————————————————————-
Question #: 5
Topic #: 1
The Administrator’s ability to protect data, systems, and assets while taking advantage of cloud technologies is commonly called:
A. Cost Optimization
B. Security
C. Operational Excellence
D. Performance Efficiency
Selected Answer: B
———————————————————————-
Question #: 6
Topic #: 1
What is Cloud Security according to the Five Pillars?
A. The ability to support development and run workloads effectively
B. The ability of a Workload to function correctly and consistently in all expected
C. The ability to use cloud resources efficiently for meeting system requirements, and maintaining that efficiency as demand changes and technologies evolve
D. In terms of the cloud, security is about architecting every workload to prevent
Selected Answer: D
———————————————————————-
Question #: 7
Topic #: 1
Which is not a cloud component?
A. Marketplace
B. Identity and Access Management
C. Compute
D. VLAN
Selected Answer: D
———————————————————————-
Question #: 8
Topic #: 1
One of the five pillars of the framework for cloud security is ‘Performance Efficiency’. The design principles of Performance Efficiency include:
A. Automatically recover from failure
Test recovery procedures
B. Adopt a consumption model –
Measure overall efficiency
C. Go Global in minutes –
Use serverless architectures
D. Apply security at all layers –
Automate security best practices
Selected Answer: C
———————————————————————-
Question #: 9
Topic #: 1
The framework for cloud security consists of five basic components, or pillars. Making small, reversible changes is a design principle of which of these five pillars?
A. Reliability
B. Performance Efficiency
C. Cost Optimization
D. Operational Excellence
Selected Answer: D
———————————————————————-
Question #: 10
Topic #: 1
What are the languages supported for Cloud Templates?
A. JSON and YAML
B. JSON and Python
C. Python and PERL
D. YAML and Python
Selected Answer: A
———————————————————————-
Question #: 11
Topic #: 1
Which is not a responsibility of the Customer?
A. Infrastructure Patching and Configuration
B. Service, Communication, and Data Security
C. Guest OS and Application Patching and Configuration
D. Customer Employee Training
Selected Answer: A
———————————————————————-
Question #: 12
Topic #: 1
Which of the following is the Customer’s Responsibility in the shared responsibility model used in the cloud?
A. Customer Employee Training
B. Infrastructure Patching
C. Physical and Environment Controls
D. Infrastructure Configuration
Selected Answer: A
———————————————————————-
Question #: 13
Topic #: 1
Which software blade provides forensic analysis tools?
A. Logging Blade
B. Identity Awareness Blade
C. Monitoring Blade
D. SmartEvent Blade
Selected Answer: D
———————————————————————-
Question #: 14
Topic #: 1
What is the primary difference between Vertical and Horizontal autoscaling?
A. Vertical scaling doesn’t require moving resources but horizontal scaling does.
B. Vertical scaling is automatic and horizontal scaling is manual.
C. Vertical scaling is linear and horizontal scaling goes across.
D. Vertical scaling requires a virtual machine to completely shut down as opposed to horizontal scaling transferring resources without having to power down the VM.
Selected Answer: D
———————————————————————-
Question #: 15
Topic #: 1
What is vertical scaling?
A. Tunes the environment up and down according to the resource capacity needs.
B. Tunes the environment by automatically adding or removing resources to the SDN.
C. Tunes the environment by manually adding or removing resources to an SDDC.
D. Scaling method that does not require a system shutdown to add or remove resources.
Selected Answer: A
———————————————————————-
Question #: 16
Topic #: 1
The integration of cloud resources into the Security Policy requires establishing a secure connection between:
A. The SDDC, CloudGuard Security Gateways, and the Security Management Server.
B. The SDDC and CloudGuard Security Gateways.
C. The SDDC and the Security Management Server.
D. CloudGuard Security Gateways and the Security Management Server.
Selected Answer: A
———————————————————————-
Question #: 17
Topic #: 1
What part of the Secure Public Cloud Blueprint may be housed in on-premises equipment?
A. Peering Connection
B. Security Gateway
C. Security Management Server
D. Application Server
Selected Answer: C
———————————————————————-
Question #: 18
Topic #: 1
Which cloud components specify the Workloads associated with traffic and tell load balancers which Workloads are members of the same group?
A. Target Groups
B. Listening Rules
C. Dynamic assignment
D. Health Checks
Selected Answer: A
———————————————————————-
Question #: 19
Topic #: 1
A utility that allows integration between the SMS, the CloudGuard Network solution, and CSPs, allowing the SMS to monitor and control scaling solutions in their associated cloud environments is called:
A. CloudGuard Management Extension (CME)
B. CloudGuard Controller and Enforcer (CCE)
C. CloudGuard Scanner and Enforcer (CSE)
D. CloudGuard Controller (CC)
Selected Answer: A
———————————————————————-
Question #: 20
Topic #: 1
Which utility allows integration between the Check Point Security Management Server, the CloudGuard Network solution, and the CSPs?
A. CloudGuard Controller
B. Elastic Licensing
C. Maestro
D. CloudGuard Management Extension
Selected Answer: D
