How can you insure that the list of recommendations is always kept up to date?

The Intrusion Prevention Protection Module is enabled and a Recommendation Scan is run to identify vulnerabilities on a Windows Server 2016 computer. How can you insure that the list of recommendations is always kept up to date?A . Disabling, then re-enabling the Intrusion Prevention Protection Module will trigger a new...

October 24, 2022 No Comments READ MORE +

What behavior can you expect for newly discovered computers?

New servers are added to the Computers list in Deep Security Manager Web config by running a Discover operation. What behavior can you expect for newly discovered computers?A . Any servers discovered in the selected Active Directory branch hosting a Deep Security Agent will be added to the Computers list....

October 24, 2022 No Comments READ MORE +

Which of the following statements is true regarding Intrusion Prevention rules?

Which of the following statements is true regarding Intrusion Prevention rules?A . Intrusion Prevention rules can block unrecognized software from executing. B. Intrusion Prevention rules check for the IP addresses of known malicious senders within a packet C. Intrusion Prevention rules can detect or block traffic associated with specific applications,...

October 22, 2022 No Comments READ MORE +

Which of the following statements is false regarding the Log Inspection Protection Module?

Which of the following statements is false regarding the Log Inspection Protection Module?A . Custom Log Inspections rules can be created using the Open Source Security (OSSEC) standard. B. Deep Security Manager collects Log Inspection Events from Deep Security Agents at every heartbeat. C. The Log Inspection Protection Module is...

October 22, 2022 No Comments READ MORE +

As the administrator in a multi-tenant environment, you would like to monitor the usage of security services by tenants? Which of the following are valid methods for monitoring the usage of the system by the tenants?

As the administrator in a multi-tenant environment, you would like to monitor the usage of security services by tenants? Which of the following are valid methods for monitoring the usage of the system by the tenants?A . Generate a Chargeback report in Deep Security manager Web console. B. All the...

October 22, 2022 No Comments READ MORE +