Recommendation scans can detect applications and/or vulnerabilities on servers on the network. Which of the following Protection Modules make use of Recommendation scans?
Answer : D
Recommendation Scans can suggest rules for the following Protection Modules:
* Intrusion Prevention
* Integrity Monitoring
* Log Inspection
Explication: Study Guide - page (161)
Based on the policy configuration displayed in the exhibit, which of the following statements is true?
Answer : B
Which of the following statements is true regarding the Intrusion Prevention Protection Module?
Answer : B
deep-security-protection-modules
Policies in Deep Security can include a Context value. Which of the following statements re-garding Context is correct?
Answer : B
Contexts are designed to be associated with Firewall and Intrusion Prevention Rules. If the condi-tions defined in the Context associated with a rule are met, the rule is applied. To link a security rule to a Context, go to the Options tab in the Properties window for the rule and select the Context from the menu.
Explication: Study Guide - page (165)
Which of the following statements is false regarding the Log Inspection Protection Module?
Answer : C
Log Inspection requires running some analysis on the computer and is not supported in Agentless deployments.
Explication: Study Guide - page (310)
Which of the following statements is true regarding Event Tagging?
Answer : C
Which of the following operations makes use of the Intrusion Prevention Protection Module?
Answer : D