The Overrides settings for a computer are displayed in the exhibit. Which of the following statements is true regarding the displayed configuration?
Answer : C
Which of the following are valid methods for pre-approving software updates to prevent Ap-plication Control Events from being triggered by the execution of the modified software? Select all that apply.
Answer : B, D
Normally, you will want Application Control to alert you when there are any unexpected software updates. However, some updates are expected and you will need provide allowances for these up-dates. Two methods for pre-approving software updates includes maintenance mode and trusted installers.
Explication: Study Guide - page (303-304)
Multi-tenancy is enabled in Deep Security and new tenants are created. Where does the new tenant data get stored when using SQL Server as the Deep Security database?
Answer : C
With Microsoft SQL and PostgreSQL, there's one main database and an additional database for each tenant. With Oracle, all tenant information is in one Deep Security Manager database, but an additional user is created for each tenant. Each user has its own tables.
Explication: Study Guide - page (409)
The Intrusion Prevention Protection Module is enabled, its Behavior is set to Prevent and rules are assigned. When viewing the events, you notice that one of Intrusion Prevention rules is being triggered and an event is being logged but the traffic is not being blocked. What is a possible reason for this?
Answer : D
What is the purpose of the override.properties file?
Answer : B
The properties specified in this configuration file override the properties specified in the dsm.properties file. This file can be created manually by a support engineer to modify product be-havior without affecting the original configuration.
Explication: Study Guide - page (42)
What is the effect of the Firewall rule displayed in the following exhibit?
Answer : A
Which of the following statements is true regarding Deep Security Relays?
Answer : D