Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What is the effect of the Firewall rule displayed in the following exhibit?

A.

This rule will allow incoming TCP and UPD communication to this server.

B.

This rule will allow outgoing TCP and UPD communication from this server.

C.

This rule will allow TCP and UPD replies to requests originating on this server.

D.

This rule will allow incoming communication to this server, but not TCP and UPD.

Based on the details of event displayed in the exhibit, which of the following statements is false?

A.

You can instruct the Deep Security Agents and Appliances to block traffic from the source IP address for a period of time.

B.

You can create a firewall rule to permanently block traffic from the originating IP ad-dress.

C.

The scan may be generated from an IP address which may be known to you. If so, the source IP address can be added to the reconnaissance whitelist.

D.

The Intrusion Prevention Protection Modules must be enabled to detect reconnaissance scans.

What is the role of Apex Central in the Connected Threat Defense infrastructure?

A.

Apex Central distributes Deep Security policies to Agents on the protected Servers.

B.

Apex Central submits suspicious files to Deep Discovery Analyzer for further analysis.

C.

Apex Central stores suspicious files that are awaiting submission to the Deep Discovery Analyzer.

D.

Apex Central compiles the Suspicious Objects List based on the result of file analysis in Deep Discovery Analyzer.

What is the result of performing a Reset operation on a Deep Security Agent?

A.

A Reset operation generates Event information that can be used to troubleshoot Agent-to -Manager communication issues.

B.

A Reset operation forces an update to the Deep Security Agent software installed on a managed computer.

C.

A Reset operation forces the Deep Security Agent service to restart on the managed computer.

D.

A Reset operation wipes out any Deep Security Agent settings, including its relationship with Deep Security Manager.

The details for an event are displayed in the exhibit. Based on these details, which Protection Module generated the event?

A.

Integrity Monitoring

B.

Firewall

C.

Web Reputation

D.

Intrusion Prevention

Policies in Deep Security can include a Context value. Which of the following statements re-garding Context is correct?

A.

The Context provides Deep Security Agents with location awareness and are associated with Anti-Malware and Web Reputation Rules.

B.

The Context provides Deep Security Agents with location awareness and are associated with Firewall and Intrusion Prevention Rules.

C.

The Context provides Deep Security Agents with location awareness and are associated with Web Reputation Rules only.

D.

The Context provides Deep Security Agents with location awareness and are associated with Log Inspection and Integrity Monitoring Rules.

What is the purpose of the Deep Security Relay?

A.

Deep Security Relays distribute load to the Deep Security Manager nodes in a high-availability implementation.

B.

Deep Security Relays forward policy details to Deep Security Agents and Virtual Ap-pliances immediately after changes to the policy are applied.

C.

Deep Security Relays maintain the caches of policies applied to Deep Security Agents on protected computers to improve performance.

D.

Deep Security Relays are responsible for retrieving security and software updates and distributing them to Deep Security Manager, Agents and Virtual Appliances.

In the policy displayed in the exhibit, the state of the Web Reputation Protection Module is set to "Inherited (On)", while the state for the other Protection Module is set to "On". Why is the Web Reputation Protection Module displayed differently than the other Protection Modules.

A.

In this example, the state for the Web Reputation Protection Module is inherited from the parent policy, while the other Protection Modules were turned on specifically in this child policy.

B.

The state for a Protection Module is always displayed as "Inherited (On)" until the module components are installed on the Deep Security Agent.

C.

In this example, the state for the Web Reputation Protection Module is inherited from the parent policy, while the other Protection Modules were turned on at the computer level.

D.

In this example, the state for the Web Reputation Protection Module is listed as "In-herited (On)" as it was inherited from the default setting in the Base Policy.

The details for an event are displayed in the exhibit. Based on these details, which Protection Module generated the event?

A.

Firewall

B.

Intrusion Prevention

C.

Log Inspection

D.

Integrity Monitoring

The Overrides settings for a computer are displayed in the exhibit. Which of the following statements is true regarding the displayed configuration?

A.

The Web Reputation and Application Control Protection Modules have been assigned a different policy that the other Protection Modules and as a result, are displayed with overrides.

B.

The configuration for the Protection Modules is inherited from the policy assigned to this computer, except for the configuration of the Web Reputation and Application Control Protection Modules which have been set at the computer level.

C.

The Protection Modules identified as Inherited in the exhibit have not yet been config-ured. Only the Web Reputation and Application Control Protection Modules have been configured.

D.

The Protection Modules identified as Inherited in the exhibit have not yet been enabled. Only the Web Reputation and Application Control Protection Modules have been enabled at this point.