How is scan caching used in agentless implementations of Deep Security?
Answer : D
Where does Deep Security Manager store the credentials it uses to access the database?
Answer : B
Which of the following statements is correct regarding the policy settings displayed in the exihibit?
Answer : C
Based on the following exhibit, what behavior would you expect for the Application Control Protection Module?
Answer : A
Which of the following statements correctly describes Smart Folders?
Answer : C
Smart Folders are used to group your computers dynamically. The computers displayed in a Smart Folder are determined by a set of custom rules, that act as a saved search which is executed each time you click on the folder to display its contents. This allows administrators to easily filter and group computers by these defined properties.
Explication: Study Guide - page (127)
The "Protection Source when in Combined Mode" settings are configured for a virtual machine as in the exhibit. You would like to enable Application Control on this virtual machine, but there is no corresponding setting displayed. Why?
Answer : B
Based on the policy configuration displayed in the exhibit, which of the following statements is true?
Answer : B