Weekend Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

Deep-Security-Professional Questions and Answers

Question # 6

What is the purpose of the Deep Security Relay?

A.

Deep Security Relays distribute load to the Deep Security Manager nodes in a high-availability implementation.

B.

Deep Security Relays forward policy details to Deep Security Agents and Virtual Ap-pliances immediately after changes to the policy are applied.

C.

Deep Security Relays maintain the caches of policies applied to Deep Security Agents on protected computers to improve performance.

D.

Deep Security Relays are responsible for retrieving security and software updates and distributing them to Deep Security Manager, Agents and Virtual Appliances.

Full Access
Question # 7

Which of the following statements is true regarding the Intrusion Prevention Protection Module?

A.

The Intrusion Prevention Protection Module blocks or allows traffic based on header information within data packets.

B.

The Intrusion Prevention Protection Module analyzes the payload within incoming and outgoing data packets to identify content that can signal an attack.

C.

The Intrusion Prevention Protection Module can identify changes applied to protected objects, such as the Hosts file, or the Windows Registry.

D.

The Intrusion Prevention Protection Module can prevent applications from executing, allowing an organization to block unallowed software.

Full Access
Question # 8

The Firewall Protection Module is enabled on a server through the computer details. What is default behavior of the Firewall if no rules are yet applied?

A.

All traffic is permitted through the firewall until either a Deny or Allow rule is assigned.

B.

A collection of default rules will automatically be assigned when the Firewall Protection Module is enabled.

C.

All traffic is blocked by the firewall until an Allow rule is assigned.

D.

All traffic is passed through the Firewall using a Bypass rule

Full Access
Question # 9

Which of the following statements is true regarding Intrusion Prevention rules?

A.

Intrusion Prevention rules can block unrecognized software from executing.

B.

Intrusion Prevention rules check for the IP addresses of known malicious senders within a packet

C.

Intrusion Prevention rules can detect or block traffic associated with specific applica-tions, such as Skype or file-sharing utilities.

D.

Intrusion Prevention rules monitor the system for changes to a baseline configuration.

Full Access
Question # 10

Which of the following statements is true regarding Maintenance Mode in the Application Control protection Module?

A.

While in Maintenance Mode, all Block and Allow rules are ignored while new or updated applications are added to the software inventory

B.

When in Maintenance Mode, the Application Control Protection Module will continue to block software identified in Block rules, but will allow new and changed applications to be added to the software inventory.

C.

When enabled, Maintenance Mode rescans the protected computer to rebuild the soft-ware inventory. Any new or changed software will be included in this rebuilt inventory.

D.

Maintenance Mode can be configured as a Scheduled Event. In this scenario, all soft-ware upgrades will be performed at the same time every day to avoid creating Alerts for normal software updates.

Full Access
Question # 11

Which of the following statements is true regarding Deep Security Relays?

A.

Both 32-bit and 64-bit Deep Security Agents can be promoted to a Deep Security Relay.

B.

Deep Security Agents promoted to Deep Security Relays no longer provide the security capabilities enabled by the Protection Modules.

C.

Deep Security Relays are able to process Deep Security Agent requests during updates.

D.

Deep Security Agents communicate with Deep Security Relays to obtain security up-dates.

Full Access
Question # 12

What is the result of performing a Reset operation on a Deep Security Agent?

A.

A Reset operation generates Event information that can be used to troubleshoot Agent-to -Manager communication issues.

B.

A Reset operation forces an update to the Deep Security Agent software installed on a managed computer.

C.

A Reset operation forces the Deep Security Agent service to restart on the managed computer.

D.

A Reset operation wipes out any Deep Security Agent settings, including its relationship with Deep Security Manager.

Full Access