Based on the policy configuration displayed in the exhibit, which of the following statements is true?
Answer : B
Which of the following statements is true regarding the Intrusion Prevention Protection Module?
Answer : B
deep-security-protection-modules
Policies in Deep Security can include a Context value. Which of the following statements re-garding Context is correct?
Answer : B
Contexts are designed to be associated with Firewall and Intrusion Prevention Rules. If the condi-tions defined in the Context associated with a rule are met, the rule is applied. To link a security rule to a Context, go to the Options tab in the Properties window for the rule and select the Context from the menu.
Explication: Study Guide - page (165)
Which of the following statements is false regarding the Log Inspection Protection Module?
Answer : C
Log Inspection requires running some analysis on the computer and is not supported in Agentless deployments.
Explication: Study Guide - page (310)
Which of the following statements is true regarding Event Tagging?
Answer : C
Which of the following is NOT an operation that can be performed on Deep Security resources using the API?
Answer : C
Rest API
Which of the following statements is true regarding Deep Security Relays?
Answer : D