00:00

QUESTION 66

What is the SOLR database for?

Correct Answer: A

QUESTION 67

Which type of attack can a firewall NOT prevent?

Correct Answer: A

QUESTION 68

To view statistics on detected threats, which Threat Tool would an administrator use?

Correct Answer: D

QUESTION 69

Which Check Point software blade prevents malicious files from entering a network using virus signatures and anomaly-based protections from ThreatCloud?

Correct Answer: D
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_ThreatPrevention_AdminGuide/To

QUESTION 70

Access roles allow the firewall administrator to configure network access according to:

Correct Answer: D
To create an access role:
The Access Role window opens.
Your selection is shown in the Networks node in the Role Preview pane.
A window opens. You can search for Active Directory entries or select them from the list. You can search for AD entries or select them from the list.
The access role is added to the Users and Administrators tree. https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SecurityManagement_AdminGuide