Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

As the administrator in a multi-tenant environment, you would like to monitor the usage of security services by tenants? Which of the following are valid methods for monitoring the usage of the system by the tenants?

A.

Generate a Chargeback report in Deep Security manager Web console.

B.

All the choices listed here are valid.

C.

Use the Representational State Transfer (REST) API to collect usage data from the tenants.

D.

Monitor usage by the tenants from the Statistics tab in the tenant Properties window.

Full Access
Question # 5

An administrator attempts to activate the Deep Security Agent installed on a server by typing the following command in the Command Prompt on the Deep Security Agent computer:

dsa_control -a dsm://server1.acme.com:4120

The Agent does not activate as expected. What is a valid reason for this issue?

A.

The incorrect port was used. The correct command would be: dsa_control -a dsm://server1.acme.com:4118

B.

Deep Security Agents can not be activated through the Command Prompt. They must be activated through the Deep Security Manager Web console or through a deployment script.

C.

The command listed can only executed from the Command Prompt on the Deep Security Manager computer.

D.

"Allow Agent-Initiated Activation" is currently not enabled in Deep Security Manager.

Full Access
Question # 6

An administrator enables Multi-Tenancy in Deep Security and creates multiple tenants. After a period of time, the administrator would like to review the usage and resource consumption by a specific tenant. How can the administrator retrieve this information?

A.

The administrator could check the Multi-Tenancy log file for resource consumption details.

B.

The administrator could generate a Tenant report from within the Deep Security Manager Web console.

C.

The administrator will not be able retrieve this information without licensing and ena-bling the Multi-Tenancy Chargeback module in the Deep Security Manager Web con-sole.

D.

The administrator downloads the Tenant usage details from the Deep Security Agent on the Tenant computer.

Full Access
Question # 7

What is the purpose of the Deep Security Notifier?

A.

The Deep Security Notifier is a application in the Windows System Tray that displays the Status of Deep Security Manager during policy and software updates.

B.

The Deep Security Notifier is a server components that collects log entries from man-aged computers for delivery to a configured SIEM device.

C.

The Deep Security Notifier is a server component used in agentless configurations to allow Deep Security Manager to notify managed computers of pending updates.

D.

The Deep Security Notifier is a application in the Windows System Tray that com-municates the state of Deep Security Agents and Relays to endpoint computers.

Full Access
Question # 8

Based on the Malware Scan Configuration displayed in the exhibit, which of the following statements is false.

A.

Any document files that display suspicious behavior will be submitted and executed in a sandbox environment on a Deep Discover Analyzer device.

B.

Deep Security Agents using this Malware Scan Configuration will not monitor for compromised Windows processes.

C.

Deep Security Agents will only be able to identify malware in files by using patterns downloaded from the Smart Protection Network.

D.

Internet access is required to properly enable the features identified in this configuration.

Full Access
Question # 9

What is the default priority assigned to Firewall rules using the Allow action?

A.

Firewall rules using the Allow action always have a priority of 4.

B.

Firewall rules using the Allow action can be assigned a priority between 0 and 4.

C.

Firewall rules using the Allow action can be assigned a priority between 1 and 3.

D.

Firewall rules using the Allow action always have a priority of 0.

Full Access
Question # 10

The "Protection Source when in Combined Mode" settings are configured for a virtual machine as in the exhibit. You would like to enable Application Control on this virtual machine, but there is no corresponding setting displayed. Why?

A.

In the example displayed in the exhibit, no activation code was entered for Application Control. Since the Protection Module is not licensed, the corresponding settings are not displayed.

B.

These settings are used when both an host-based agent and agentless protection are available for the virtual machine. Since Application Control is not supported in agentless installations, there is no need for the setting.

C.

In the example displayed in the exhibit, the Application Control Protection Module has not yet been enabled. Once it is enabled for this virtual machine, the corresponding settings are displayed.

D.

In the example displayed in the exhibit, the VMware Guest Introspection Service has not yet been installed. This service is required to enable Application Control in agentless installations.

Full Access
Question # 11

Which of the following is NOT an operation that can be performed on Deep Security resources using the API?

A.

GET

B.

PUT

C.

VIEW

D.

POST

Full Access
Question # 12

Which of the following statements is true regarding Deep Security Relays?

A.

Both 32-bit and 64-bit Deep Security Agents can be promoted to a Deep Security Relay.

B.

Deep Security Agents promoted to Deep Security Relays no longer provide the security capabilities enabled by the Protection Modules.

C.

Deep Security Relays are able to process Deep Security Agent requests during updates.

D.

Deep Security Agents communicate with Deep Security Relays to obtain security up-dates.

Full Access