1.
What is the SOLR database for?
2.
Which of the following commands is used to monitor cluster members?
3.
Fill in the blank: Service blades must be attached to a ______________.
4.
Fill in the blank: An LDAP server holds one or more ______________.
5.
Fill in the blank: In Security Gateways R75 and above, SIC uses ______________ for encryption.
6.
What protocol is specifically used for clustered environments?
7.
Which command shows the installed licenses?
8.
Of all the Check Point components in your network, which one changes most often and should be backed up most frequently?
9.
Which option would allow you to make a backup copy of the OS and Check Point configuration, without stopping Check Point processes?
10.
What is the Transport layer of the TCP/IP model responsible for?