Which of the following correctly identifies the order of the steps used by the Web Reputation Protection Module to determine if access to a web site should be allowed?

Which of the following correctly identifies the order of the steps used by the Web Reputation Protection Module to determine if access to a web site should be allowed?A . Checks the cache. 2. Checks the Deny list. 3. Checks the Approved list. 4. If not found in any of...

October 29, 2022 No Comments READ MORE +

Which of the following statements is FALSE regarding Firewall rules using the Bypass action?

Which of the following statements is FALSE regarding Firewall rules using the Bypass action?A . Applying a Firewall rule using the Bypass action to traffic in one direction automatically applies the same action to traffic in the other direction. B. Firewall rules using the Bypass action do not generate log...

October 28, 2022 No Comments READ MORE +

What is default behavior of the Firewall if no rules are yet applied?

The Firewall Protection Module is enabled on a server through the computer details. What is default behavior of the Firewall if no rules are yet applied?A . All traffic is permitted through the firewall until either a Deny or Allow rule is assigned. B. A collection of default rules will...

October 28, 2022 No Comments READ MORE +

How does Smart Scan vary from conventional pattern-based anti-malware scanning?

How does Smart Scan vary from conventional pattern-based anti-malware scanning?A . Smart Scan improves the capture rate for malware scanning by sending features of suspicious files to an cloud-based server where the features are compared to known malware samples. B. Smart Scan shifts much of the malware scanning functionality to...

October 27, 2022 No Comments READ MORE +

Which of the following statements is false regarding Firewall rules using the Bypass action?

Which of the following statements is false regarding Firewall rules using the Bypass action?A . Applying a Firewall rule using the Bypass action to traffic in one direction automatically applies the same action to traffic in the other direction. B. Firewall rules using the Bypass action do not generate log...

October 27, 2022 No Comments READ MORE +

The details for an event are displayed in the exhibit. Based on these details, which Protection Module generated the event?

The details for an event are displayed in the exhibit. Based on these details, which Protection Module generated the event? A . Firewall B. Intrusion Prevention C. Log Inspection D. Integrity MonitoringView AnswerAnswer: C

October 26, 2022 No Comments READ MORE +

How can you prevent a file from being scanned for malware?

How can you prevent a file from being scanned for malware?A . Enable "File Types scanned by IntelliScan" in the Malware Scan Configuration prop-erties in the Deep Security Manager Web console. Click "Scan All Except" and type the filename to exclude from the scan. B. Edit the "Scan Exclusions" section...

October 26, 2022 No Comments READ MORE +

Based on the policy configuration displayed in the exhibit, which of the following statements is true?

Based on the policy configuration displayed in the exhibit, which of the following statements is true? A . Changes to any of the Deep Security policies will be send to the Deep Security Agents as soon as the changes are saved. B. Administrators with access to the protected Server will...

October 25, 2022 No Comments READ MORE +

Which of the following statements is true regarding the Log Inspection Protection Module?

Which of the following statements is true regarding the Log Inspection Protection Module?A . Deep Security Agents forward Log Inspection Event details to Deep Security Manager in real time. B. Log Inspection can only examine new Events and cannot examine logs entries created before the Protection Module was enabled. C....

October 25, 2022 No Comments READ MORE +

Why?

The "Protection Source when in Combined Mode" settings are configured for a virtual machine as in the exhibit. You would like to enable Application Control on this virtual machine, but there is no corresponding setting displayed. Why? A . In the example displayed in the exhibit, no activation code was...

October 24, 2022 No Comments READ MORE +