The Firewall Protection Module is enabled on a server through the computer details. What is default behavior of the Firewall if no rules are yet applied?
Answer : B
Deep Security provides a set of Firewall rules that can be applied to policies or directly to a com-puter.
These default rules provide coverage for typical scenarios.
Set up the Deep Security firewall
Explication: Study Guide - page (219)
Based on the script displayed in the exhibit, which of the following statements are correct? Select all that apply.
Answer : C, D
As the administrator in a multi-tenant environment, you would like to monitor the usage of security services by tenants? Which of the following are valid methods for monitoring the usage of the system by the tenants?
Answer : B
Deep Security Manager records data about tenant usage. This information is displayed in the Ten-ant Protection Activity widget on the Dashboard, the Statistics tab in tenant Properties, and the Chargeback report.
This information can also be accessed through the Status Monitoring REST API which can be enabled or disabled from the Administration > Advanced > System Settings > Advanced > Status Monitoring API.
multi-tenancy
Explication: Study Guide - page (422)
The details for an event are displayed in the exhibit. Based on these details, which Protection Module generated the event?
Answer : C
Multiple Application Control Events are being displayed in Deep Security after a series of ap-plication updates and the administrator would like to reset Application Control. How can this be done?
Answer : C
Which of the following VMware components is not required to enable agentless protection using Deep Security.
Answer : C
Integrate with VMware vRealize Operations Manager
Which of the following file types would not be evaluated by the Application Control Protection Module?
Answer : D