The maximum disk space limit for the Identified Files folder is reached. What is the expected Deep Security Agent behavior in this scenario?
Answer : D
If the limit is reached, the oldest files will be deleted first until 20% of allocated space is freed up.
Explication: Study Guide - page (203)
Which of the following operations makes use of the Intrusion Prevention Protection Module?
Answer : D
Which of the following VMware components is not required to enable agentless protection using Deep Security.
Answer : C
Integrate with VMware vRealize Operations Manager
What is the purpose of the Deep Security Notifier?
Answer : D
The Deep Security Notifier is a Windows System Tray application which provides local notification when malware is detected or malicious URLs are blocked.
It may be installed separately on protected virtual machines, however the Anti-Malware Protection Module must be licensed and enabled on the virtual machine for the Deep Security Notifier to display information.
The Notifier displays pop-up user notifications when the Anti-Malware module begins a scan, or blocks malware or access to malicious web pages. The Notifier also provides a console utility that allows the user to view events.
Explication: Study Guide - page (442)
Which of the following is not an operation that is performed when network traffic is intercepted by the network driver on the Deep Security Agent?
Answer : B
How does Smart Scan vary from conventional pattern-based anti-malware scanning?
Answer : B
Advantages of the Smart Scan pattern over the conventional pattern protection in OfficeScan (OSCE)
Multi-tenancy is enabled in Deep Security and new tenants are created. Where does the new tenant data get stored when using SQL Server as the Deep Security database?
Answer : C
With Microsoft SQL and PostgreSQL, there's one main database and an additional database for each tenant. With Oracle, all tenant information is in one Deep Security Manager database, but an additional user is created for each tenant. Each user has its own tables.
Explication: Study Guide - page (409)