One of the five pillars of the framework for cloud security is `Performance Efficiency'. The design principles of Performance Efficiency include:
A. Automatically recover from failure Test recovery procedures
B. Adopt a consumption model Measure overall efficiency
C. Go Global in minutes Use serverless architectures
D. Apply security at all layers Automate security best practices
Once the Deployment finishes, Cloud Security Posture Management applies default network security posture that does what?
A. Minimizes the risk of external threats by blocking access to high risk sites and external users
B. Minimizes the risk of external threats by blocking accessed to the internet
C. Minimizes the risk of external threats by blocking access to all internal resources
D. Minimizes the risks of external threats by blocking access to services and ports
Adaptive Security Policies allow the deployment of new cloud based resources without
A. Changing the cloud environment
B. Paying for new resources
C. Installing New Policies
D. Installing New Applications
Which pricing model gives administrators the ability to deploy devices as needed without the need to purchase blocks of vCore licenses?
A. Pay As You Go
B. Bring Your Own License
C. Central licensing
D. Local licensing
Which one of the following is part of the Orchestration Playbook process for creating a new spoke and an automated Security Gateway?
A. Transfer of resources to a VPN
B. An event trigger
C. Vertical scaling
D. Communication with the OS
Which is not a Pillar of the Framework for the Cloud?
A. Performance Efficiency
B. Cost Optimization
C. Scalability
D. Reliability
What can a Security Admin do in a situation where collecting additional log file information to examine a CloudGuard Controller issue is required?
A. Execute a debug on the SMS
B. Set the operation to TRACE to collect more data.
C. Verify connectivity between the SMS and the SDDC.
D. Search for the information in the objects database.
After the cloud acquisition process finishes. Cloud Security Posture Security module secures access to cloud environments by performing controls access to cloud environments by performing the following tasks: Visualizes Security Policies in cloud environments, control access to protected cloud assets with short-term dynamic access leases, and______________.
A. Automatically Installs Policies
B. Deploys new management resources
C. Manages Network Security Groups
D. Deploys new internal cloud resources
Which language can be used by users of Cloud Security Posture Management to create custom Security Policies?
A. eXtensible Markup Language (XML)
B. Posture Management Language (PML)
C. Governance Specific Language (GSL)
D. JavaScript Object Notation (JSON)
A utility that allows integration between SMS, the CloudGuard Network Solution, and CSPs, allowing the SMS to monitor and control scaling solutions in their associated cloud environments is called
A. CloudGuard Management Extension (CME)
B. CloudGuard Controller and Enforcer (CCE)
C. CloudGuard Scanner and Enforcer (CSE)
D. CloudGuard Controller (CC)