Which Deep Security Protection Modules can be used to provide runtime protection for the Kubernetes and Docker platforms? Select all that apply.
Answer : A, B, C
Container users can benefit from Kubernetes and Docker platform protection at runtime with Intrusion Prevention, Integrity Monitoring and Log Inspection rules using the Deep Security Agent installed on the host. The Deep Security Intrusion Prevention approach allows you to inspect both east-west and north-south traffic between containers and platform layers like Kubernetes.
Explication: Study Guide - page (353)
How is scan caching used in agentless implementations of Deep Security?
Answer : D
What is the default priority assigned to Firewall rules using the Allow action?
Answer : D
Firewall_rule_priorities
Explication: Study Guide - page (241)
A Deep Security administrator wishes to monitor a Windows SQL Server database and be alerted of any critical events which may occur on that server. How can this be achieved using Deep Security?
Answer : B
The Intrusion Prevention Protection Module is enabled, its Behavior is set to Prevent and rules are assigned. When viewing the events, you notice that one of Intrusion Prevention rules is being triggered and an event is being logged but the traffic is not being blocked. What is a possible reason for this?
Answer : D
Which of the following is not an operation that is performed when network traffic is intercepted by the network driver on the Deep Security Agent?
Answer : B
Which of the following statements regarding the Integrity Monitoring Protection Module is true?
Answer : C
integrity-monitoring-set-up