Recommendation scans can detect applications and/or vulnerabilities on servers on the network. Which of the following Protection Modules make use of Recommendation scans?
Answer : D
Recommendation Scans can suggest rules for the following Protection Modules:
* Intrusion Prevention
* Integrity Monitoring
* Log Inspection
Explication: Study Guide - page (161)
Which of the following operations makes use of the Intrusion Prevention Protection Module?
Answer : D
Which of the following VMware components is not required to enable agentless protection using Deep Security.
Answer : C
Integrate with VMware vRealize Operations Manager
What is the purpose of the Deep Security Notifier?
Answer : D
The Deep Security Notifier is a Windows System Tray application which provides local notification when malware is detected or malicious URLs are blocked.
It may be installed separately on protected virtual machines, however the Anti-Malware Protection Module must be licensed and enabled on the virtual machine for the Deep Security Notifier to display information.
The Notifier displays pop-up user notifications when the Anti-Malware module begins a scan, or blocks malware or access to malicious web pages. The Notifier also provides a console utility that allows the user to view events.
Explication: Study Guide - page (442)
Which of the following is not an operation that is performed when network traffic is intercepted by the network driver on the Deep Security Agent?
Answer : B
What is the purpose of the override.properties file?
Answer : B
The properties specified in this configuration file override the properties specified in the dsm.properties file. This file can be created manually by a support engineer to modify product be-havior without affecting the original configuration.
Explication: Study Guide - page (42)
Which of the following Firewall rule actions will allow data packets to pass through the Firewall Protection Module without being subjected to analysis by the Intrusion Prevention Protection Module?
Answer : B