3 Months Free Update
3 Months Free Update
3 Months Free Update
Which of the following statements is true regarding Intrusion Prevention rules?
Which of the following Protection Modules does not benefit from Recommendation Scans?
Based on the policy configuration displayed in the exhibit, which of the following statements is true?
The Overrides settings for a computer are displayed in the exhibit. Which of the following statements is true regarding the displayed configuration?
Based on the configuration setting highlighted in the exhibit, what behavior can be expected during a malware scan?
What is the result of performing a Reset operation on a Deep Security Agent?
When viewing the details for a policy, as displayed in the exhibit, you notice that the Application Control Protection Module is not available. In this example, why would this Protection Modules not be available?
Policies in Deep Security can include a Context value. Which of the following statements re-garding Context is correct?
What is the effect of the Firewall rule displayed in the following exhibit?
Which Deep Security Protection Modules can be used to provide runtime protection for the Kubernetes and Docker platforms? Select all that apply.
The Intrusion Prevention Protection Module is enabled, its Behavior is set to Prevent and rules are assigned. When viewing the events, you notice that one of Intrusion Prevention rules is being triggered and an event is being logged but the traffic is not being blocked. What is a possible reason for this?
The details of a policy are displayed in the exhibit. Based on these details, which of the following statements is true?
Which of the following correctly describes the Firewall rule Action of Force Allow?
Which of the following are valid methods for pre-approving software updates to prevent Ap-plication Control Events from being triggered by the execution of the modified software? Select all that apply.
As the administrator in a multi-tenant environment, you would like to monitor the usage of security services by tenants? Which of the following are valid methods for monitoring the usage of the system by the tenants?
Which of the following statements regarding the Integrity Monitoring Protection Module is true?
Which of the following is not an operation that is performed when network traffic is intercepted by the network driver on the Deep Security Agent?
An administrator attempts to activate the Deep Security Agent installed on a server by typing the following command in the Command Prompt on the Deep Security Agent computer:
dsa_control -a dsm://server1.acme.com:4120
The Agent does not activate as expected. What is a valid reason for this issue?