How is scan caching used in agentless implementations of Deep Security?
Which of the following correctly describes the Firewall rule Action of Force Allow?
Recommendation scans can detect applications and/or vulnerabilities on servers on the network. Which of the following Protection Modules make use of Recommendation scans?
Recommendation Scans can suggest rules for the following Protection Modules:
* Intrusion Prevention
* Integrity Monitoring
* Log Inspection
Explication: Study Guide - page (161)
The maximum disk space limit for the Identified Files folder is reached. What is the expected Deep Security Agent behavior in this scenario?
If the limit is reached, the oldest files will be deleted first until 20% of allocated space is freed up.
Explication: Study Guide - page (203)
Recommendation scans can detect applications and/or vulnerabilities on servers on the network. Which of the following Protection Modules make use of Recommendation scans?
Recommendation Scans can suggest rules for the following Protection Modules:
* Intrusion Prevention
* Integrity Monitoring
* Log Inspection
Explication: Study Guide - page (161)
Currently there are no comments in this discussion, be the first to comment!