What is the SOLR database for?
Correct Answer:
A
Which type of attack can a firewall NOT prevent?
Correct Answer:
A
To view statistics on detected threats, which Threat Tool would an administrator use?
Correct Answer:
D
Which Check Point software blade prevents malicious files from entering a network using virus signatures and anomaly-based protections from ThreatCloud?
Correct Answer:
D
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_ThreatPrevention_AdminGuide/To
Access roles allow the firewall administrator to configure network access according to:
Correct Answer:
D
To create an access role:
The Access Role window opens.
Your selection is shown in the Networks node in the Role Preview pane.
A window opens. You can search for Active Directory entries or select them from the list. You can search for AD entries or select them from the list.
The access role is added to the Users and Administrators tree. https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SecurityManagement_AdminGuide