A. Correction Servlets
B. Posture Correction Script - pc-script.sh
C. AutoRemed Java Applets
D. CloudBots
A. Scalable Licensing
B. Hyper Licensing
C. Management Extension
D. Elastic Licensing
A. The ability to support development and run workloads effectively
B. The ability of a Workload to function correctly and consistently in all expected
C. In terms of the cloud, security is about architecting every workload to prevent
D. The ability to use cloud resources efficiently for meeting system requirements, and maintaining that efficiency as demand changes and technologies evolve
A. PowerShell + Azure Portal (ARM)
B. PowerShell + Azure Security Center
C. Azure Portal (ARM)
D. Azure Security Center + Azure Portal (ARM)
A. Vertical scaling requires a virtual machine to completely shut down as opposed to horizontal scaling transferring resources without having to power down the VM.
B. Vertical scaling is automatic and horizontal scaling is manual.
C. Vertical scaling doesn't require moving resources but horizontal scaling does.
D. Vertical scaling is linear and horizontal scaling goes across.
A. No, Check Point policy forbids the change of the templates
B. Yes but only the number vNics
C. Yes you can
D. No, altering the solution template is forbidden by Azure
A. Public IP, Private IP, NAT or IAM roles
B. Compute, Regions or Availability Zones
C. vNets, VPCs or Network Security Groups
D. Cloud Data Center, Tags, subnets, or hosts
A. All Check Point blades are supported
B. Mobile Access (SSLVPN)
C. IPS
D. VPN blade
A. It creates borders within the cloud's perimeter to protect the major inbound and outbound traffic intersections.
B. It applies a Security Gateway that enforces firewall policies to accept legitimate network traffic flows and deny unauthorized traffic
C. Micro-segmentation does not create boundaries.
D. It places inspection points between different applications, services, and single hosts within the same network segment.
A. Application Control
B. Identity Awareness
C. Access Control
D. Threat Prevention