Examen Deep Security 2020 Utlima PDF
Examen Deep Security 2020 Utlima PDF
html
• Intrusion Prevention protection can drop malicious packets but cannot reset the connection
• Intrusion Prevention protection can drop or reset a connection.
• Intrusion Prevention protection only works in conjunction with the Anti-Malware Protection Module.
• Intrusion Prevention protection can only work on computers where a Deep Security Agent is installed; agentless protection
is not supported.
2) Based on the policy configuration displayed in the exhibit, which of the following statements is true?
• If the Deep Security Manager does not receive a message from the Deep Security agent every 20 minutes, an
alert will be raised.
• Deep Security Agents will send event information to Deep Security Manager every 10 minutes.
• Changes to any of the Deep Security policies will be send to the Deep Security Agents as soon as the changes are
saved.
• Administrators with access to the protected server will be able to uninstall the Deep Security Agent through
Windows Control Panel.
3) Which of the following statements is false regarding the Log Inspection Protection Module?
• Scan for Recommendations identifies Log Inspection rules that Deep Security should implement.
• Custom Log Inspections rules can be created using the Open Source Security (OSSEC) standard.
• The Log Inspection Protection Module is supported in both agent-based and agentless environments.
• Deep Security Manager collects Log Inspection Events from Deep Security Agents at every heartbeat.
4) New servers are added to the Computers list in Deep Security Manager Web console by running a Discover
operation. What behavior can you expect for newly discovered computers?
• Any servers within the IP address range will be added to the Computers list, regardless of whether they are
hosting a Deep Security Agent or not.
• Any servers within the IP address range that are hosting Deep Security Agents will be added to the Computers list
and will be automatically activated.
• Any servers within the IP address range hosting a Deep Security Agent will be added to the Computers list.
• Any servers discovered in the selected Active Directory branch hosting a Deep Security Agent will be added to the
Computers list.
7) Which of the following statements is correct regarding the policy settings displayed in the exhibit?
• Deep Security Agents using the displayed policy will send event details to Deep Security Manager every 5
minutes.
• The Heartbeat interval value displayed in this policy is inherited from the parent policy.
• All Deep Security Agents will send event details to Deep Security Manager every 5 minutes.
• Deep Security Manager will refresh the policy details on the Deep Security Agents using this policy every 5
minutes.
8) Multi-tenancy is enabled in Deep Security and new tenants are created. Where does the new tenant data get stored
when using SQL Server as the Deep Security database?
• An additional table is created for each new tenant in the existing database in the SQL Server database to store its
data.
• An additional database is created in SQL Server for each new tenant to store its data.
• The new tenant data is added to the existing SQL Server database.
• An additional user is created for each new tenant in the SQL Server database to store its data.
9) A collection of servers protected by Deep Security do not have Internet access. How can Smart Scan be used on these
computers.
• Promote one of the Deep Security Agents on the air-gapped computers to become a Relay.
• Install a Smart Protection Server in the environment and set it as the source for the File Reputation Service.
• Smart Scan can be configured to use a local pattern file containing the same information as the Smart Protection
Network.
• Smart Scan must contact the Smart Protection Network to function. Any servers without Internet access will be
unable to use Smart Scan.
• You can instruct the Deep Security Agents and Appliances to block traffic from the source IP address for a period
of time.
• The scan may be generated from an IP address which may be known to you. If so, the source IP address can be
added to the reconnaissance whitelist.
• The Intrusion Prevention Protection Modules must be enabled to detect reconnaissance scans.
• You can create a firewall rule to permanently block traffic from the originating IP address.
13) Which Protection Modules can make use of a locally installed Smart Protection Server?
• The Anti-Malware, Web Reputation and Intrusion Prevention Protection Modules can make use of the locally
installed Smart Protection Server.
• Anti-Malware is the only Protection Module that can use the locally installed Smart Protection Server.
• The Anti-Malware and Web Reputation Protection Modules can make use of the locally installed Smart Protection
Server.
• All Protection Modules can make use of the locally installed Smart Protection Server.
Multiple Choice
14) As the administrator in a multi-tenant environment, you would like to monitor the usage of security services by
tenants? Which of the following are valid methods for monitoring the usage of the system by the tenants? Select all that
apply.
• Monitor the Tenant Protection Activity widget on the Dashboard.
• Generate a Chargeback report in Deep Security Manager Web console.
• Use the Representational State Transfer (REST) API to collect usage data from the tenants.
• Monitor usage by the tenants from the Statistics tab in the tenant Properties window.
15) The Firewall Protection Module is enabled on a server through the computer details. What is default behavior of the
Firewall if no rules are yet applied?
• All traffic is permitted through the firewall until either a Deny or Allow rule is assigned.
• All traffic is passed through the Firewall using a Bypass rule
• All traffic is blocked by the firewall until an Allow rule is assigned.
• A collection of default rules will automatically be assigned when the Firewall Protection Module is enabled.
17) An administrator attempts to activate the Deep Security Agent installed on a server by typing the following command in
the Command Prompt on the Deep Security Agent computer:
dsa_control -a dsm://server1.acme.com:4120
• The Agent does not activate as expected. What is a valid reason for this issue?
• The command listed can only executed from the Command Prompt on the Deep Security Manager computer.
• "Allow Agent-Initiated Activation" is currently not enabled in Deep Security Manager.
• Deep Security Agents can not be activated through the Command Prompt. They must be activated through the
Deep Security Manager Web console or through a deployment script.
The incorrect port was used. The correct command would be:
dsa_control -a dsm://server1.acme.com:4118
18) Which of the following Protection Modules does not benefit from Recommendation Scans?
• Firewall
• Log Inspection
• Integrity Monitoring
• Intrusion Prevention
20) In the policy displayed in the exhibit, the state of the Web Reputation Protection Module is set to "Inherited (On)", while
the state for the other Protection Modules is set to "On". Why is the Web Reputation Protection Module displayed
differently than the other Protection Modules.
• In this example, the state for the Web Reputation Protection Module is listed as "Inherited (On)" as it was inherited
from the default setting in the Base Policy.
• In this example, the state for the Web Reputation Protection Module is inherited from the parent policy, while the
other Protection Modules were turned on specifically in this child policy.
• The state for a Protection Module is always displayed as "Inherited (On)" until the module components are
installed on the Deep Security Agent.
• In this example, the state for the Web Reputation Protection Module is inherited from the parent policy, while the
other Protection Modules were turned on at the computer level.
21)Which of the following statements is true regarding the use of the Firewall Protection Module in Deep Security?
• The Firewall Protection Module can prevent DoS attacks originating from multiple systems.
• The Firewall Protection Module can identify suspicious byte sequences in packets.
• The Firewall Protection Module can detect and block Cross Site Scripting and SQL Injection attacks.
• The Firewall Protection Module can check files for certain characteristics such as compression and known exploit
code.
22) Based on the Computer settings displayed in the exhibit, which of the following statements is correct?
• Administrators performing maintenance on this server will require a password to disable the Deep Security Agent
service.
• The Deep Security Agent on this server will contact the Smart Protection Network directly to submit file features for
Predictive Machine Learning analysis.
• Recommendation Scans will be performed automatically on this server whenever new rules are downloaded from
the ActiveUpdate Server to determine if they must be applied.
• If this server does not communicate with Deep Security Manager for a specific period of time, it will be
automatically removed from the Computers list.
23) Which of the following statements is true regarding the Log Inspection Protection Module?
• Deep Security Agents forward Log Inspection event details to Deep Security Manager in real time.
• The Log Inspection Protection Module is supported in both Agent-based and Agentless implementations.
• Log Inspection can only examine new events and cannot examine logs entries created before the Protection Module was
enabled.
• Log Inspection can only examine Deep Security log information.
25) Which of the following VMware components is not required to enable agentless protection using Deep Security?
• VMware ESXi
• VMware NSX
• VMware vCenter
• VMware vRealize
26) The Intrusion Prevention Protection Module is enabled, but the traffic it is trying to analyze is encrypted through https.
How is it possible for the Intrusion Prevention Protection Module to monitor this encrypted traffic against the assigned
rules?
• It is possible to monitor the https traffic by creating an SSL Configuration. Creating a new SSL Configuration will
make the key information needed to decrypt the traffic available to the Deep Security Agent.
• The Intrusion Prevention Protection Module can analyze https traffic if the public certificate of the originating server
is imported into the certificate store on the Deep Security Agent computer.
• The Intrusion Prevention Protection Module can only analyze https traffic originating from other servers hosting a
Deep Security Agent.
• The Intrusion Prevention Protection Module is not able to analyze encrypted https traffic.
28) The "Protection Source when in Combined Mode" settings are configured for a virtual machine as in the exhibit. You
would like to enable Application Control on this virtual machine, but there is no corresponding setting displayed. Why?
• In the example displayed in the exhibit, the Application Control Protection Module has not yet been enabled. Once
it is enabled for this virtual machine, the corresponding settings are displayed.
• In the example displayed in the exhibit, the VMware Guest Introspection Service has not yet been installed. This
service is required to enable Application Control in agentless installations.
• These settings are used when both a host-based Agent and Agentless protection are available for the virtual
machine. Since Application Control is not supported in Agentless installations, there is no need for the setting.
• In the example displayed in the exhibit, no activation code was entered for Application Control. Since the
Protection Module is not licensed, the corresponding settings are not displayed.
29)
Policies in Deep Security can include a Context value. Which of the following statements regarding Context is correct?
• The Context provides Deep Security Agents with location awareness and is associated with Firewall and Intrusion
Prevention Rules.
• The Context provides Deep Security Agents with location awareness and is associated with Anti-Malware and
Web Reputation Rules.
• The Context provides Deep Security Agents with location awareness and is associated with Web Reputation Rules
only.
• The Context provides Deep Security Agents with location awareness and is associated with Log Inspection and
Integrity Monitoring Rules.
30)
How is caching used by the Web Reputation Protection Module?
• Caching is used by the Web Reputation Protection Module to temporarily store the pages that make up the Web
site. The Web site is cached in case the site is visited again within the life of the cache.
• Caching is used by the Web Reputation Protection Module to keep track of Web sites that are added to the
Allowed list. Any sites added to the Allowed list will be accessible by protected servers regardless of their
credibility score.
• Caching is used by the Web Reputation Protection Module to temporarily store the credibility score for a Web site.
The retrieved credibility score is cached in case the score for the Web site is required again for the life of the
cache.
file:///D:/Siscotec/Trend/Deep Security 12/lmsilt_ quiz.html 9/22
30/6/2020 lmsilt_ quiz.html
• Caching is used by the Web Reputation Protection Module to keep track of Allowed and Blocked Web sites. Any
sites that are Allowed or Blocked do not require the retrieval of a credibility score from the Trend Micro Web
Reputation Service.
31)
While viewing the details of the Firewall Protection Module, as displayed in the exhibit, you note that a few rules have
already been assigned. You try to disable these rules, but they can not be unassigned. Why can the displayed rules not be
unassigned?
• The rules displayed in the exhibit have been hard-coded with the details of the policy. These rules will
automatically be assigned to all Firewall policies that are created and can not be unassigned.
• The rules displayed in the exhibit were assigned to the policy automatically when a Recommendation Scan was
run. Rules assigned through a Recommendation Scan can not be disabled once assigned.
• The rules displayed in the exhibit have been assigned to the policy at the parent level. Rules assigned to a parent
policy can not be unassigned at the child level.
• The rules displayed in the exhibit can not be unassigned as the administrator currently logged into the Deep
Security Manager Web console does not have the permissions necessary to unassign rules.
32) Which of the following Firewall rule actions will allow data packets to pass through the Firewall Protection Module without being
subjected to analysis by the Intrusion Prevention Protection Module?
• Deny
• Force Allow
• Bypass
• Allow
33) Which of the following correctly identifies the order of the steps used by the Web Reputation Protection Module to
determine if access to a web site should be allowed?
• Checks the Deny list.
2. Checks the Approved list.
3. Checks the cache.
4. If not found in any of the above, retrieves the credibility score from Rating Server.
5. Evaluates the credibility score against the Security Level to determine if access to the web site should be
allowed.
• Checks the cache.
2. Checks the Deny list.
3. Checks the Approved list.
4. If not found in any of the above, retrieves the credibility score from Web Reputation Service.
34) Which of the following statements is true regarding Deep Security Relays?
• Deep Security Agents communicate with Deep Security Relays to obtain security updates.
• Deep Security Relays are able to process Deep Security Agent requests during updates.
• Deep Security Agents promoted to Deep Security Relays no longer provide the security capabilities enabled by the
Protection Modules.
• Both 32-bit and 64-bit Deep Security Agents can be promoted to a Deep Security Relay.
35) Which of the following operations makes use of the Intrusion Prevention Protection Module?
• Application traffic control
• Stateful traffic analysis
• Port scans
• Integrity scans
36) Which of the following file types would not be evaluated by the Application Control Protection Module?
• .exe files
• .class files
• .py scripts
• .docx files
37) What is the default priority assigned to Firewall rules using the Allow action?
• Firewall rules using the Allow action always have a priority of 0.
• Firewall rules using the Allow action can be assigned a priority between 1 and 3.
• Firewall rules using the Allow action can be assigned a priority between 0 and 4.
• Firewall rules using the Allow action always have a priority of 4.
38) The maximum disk space limit for the Identified Files folder is reached. What is the expected Deep Security Agent
behavior in this scenario?
• Files will no longer be quarantined. Any new files due to be quarantined will be deleted instead.
• Deep Security Agents will delete the oldest files in this folder until 20% of the allocated space is available.
• Any existing files are in the folder are compressed and forwarded to Deep Security Manager to free up disk space.
• Deep Security Agents will delete any files that have been in the folder for more than 60 days.
Multiple Choice
39) Based on the script displayed in the exhibit, which of the following statements are correct? Select all that apply.
• Deep Security Agents deployed using this script are activated against a specific tenant.
• Deep Security Agents deployed using this script will be assigned a specific policy when activated.
• This script will deploy the Deep Security Agent on a server, but will not automatically activate it.
• Deep Security Agents deployed using this script will be activated against Tenant 0 in a multi-tenant environment.
40) The Overrides settings for a computer are displayed in the exhibit. Which of the following statements is true regarding
the displayed configuration?
• The Web Reputation and Application Control Protection Modules have been assigned a different policy that the
other Protection Modules and as a result, are displayed with overrides.
• The configuration for the Protection Modules is inherited from the policy assigned to this computer, except for the
configuration of the Web Reputation and Application Control Protection Modules which have been set at the
computer level.
• The Protection Modules identified as Inherited in the exhibit have not yet been configured. Only the Web
Reputation and Application Control Protection Modules have been configured.
• The Protection Modules identified as Inherited in the exhibit have not yet been enabled. Only the Web Reputation
and Application Control Protection Modules have been enabled at this point.
file:///D:/Siscotec/Trend/Deep Security 12/lmsilt_ quiz.html 12
/22
30/6/2020 lmsilt_ quiz.html
41) The Security Level for Web Reputation in a policy is set to High. A server assigned this policy attempts to access a
Web site with a credibility score of 78. What is the result?
• The Deep Security Agent allows access as the credibility score for the Web site is above the allowed threshold.
• The Deep Security Agent displays a warning message as the site is unrated.
• The Deep Security Agent blocks access as the credibility score for the Web site is below the allowed threshold. An
error page is displayed in the Web browser.
• The Deep Security Agent allows access to the Web site, and logs the connection attempt as an event.
42) Which of the following statements is true regarding Intrusion Prevention rules?
• Intrusion Prevention rules can block unrecognized software from executing.
• Intrusion Prevention rules check for the IP addresses of known malicious senders within a packet.
• Intrusion Prevention rules can detect or block traffic associated with specific applications, such as Skype or file-sharing
utilities.
• Intrusion Prevention rules monitor the system for changes to a baseline configuration.
43) The Intrusion Prevention Protection Module is enabled, its behavior is set to Prevent and rules are assigned. When
viewing the events, you notice that one of Intrusion Prevention rules is being triggered and an event is being logged but
the traffic is not being blocked. What is a possible reason for this?
• The Deep Security Agent is experiencing a system problem and is not processing packets since the "Network
Engine System Failure" mode is set to "Fail Open".
• The Intrusion Prevention rule is being triggered as a result of the packet sanity check failing and the packet is
being allowed to pass.
• The default Prevention Behavior in this particular rule may be set to Detect. This logs the triggering of the rule, but
does not actually enforce the block.
• The network engine is running in Inline mode. In Inline mode, Deep Security provides no protection beyond a
record of events.
44) Multiple Application Control events are being displayed in Deep Security after a series of application updates and the
administrator would like to reset Application Control. How can this be done?
• On the Deep Security Agent computer, type the following command to reset Application Control: dsa_control -r
• Application Control can be reset by disabling the Protection Module, then enabling it once again. This will cause
local rulesets to be rebuilt.
• Click "Clear All" on the Actions tab in the Deep Security Manager Web console to reset the list of Application
Control events.
• Application Control cannot be reset.
45) An administrator enables Multi-Tenancy in Deep Security and creates multiple tenants. After a period of time, the
administrator would like to review the usage and resource consumption by a specific tenant. How can the administrator
retrieve this information?
• The administrator could check the Multi-Tenancy log file for resource consumption details.
• The administrator downloads the Tenant usage details from the Deep Security Agent on the Tenant computer.
• The administrator will not be able retrieve this information without licensing and enabling the Multi-Tenancy
Chargeback module in the Deep Security Manager Web console.
• The administrator could generate a Tenant report from within the Deep Security Manager Web console.
46) Which of the following is not an operation that is performed when network traffic is intercepted by the network driver on
the Deep Security Agent?
• Verify the integrity of the packet to insure the packet is suitable for analysis.
• Verify the packet is not part of a reconnaissance scan used to discover weaknesses on the Deep Security Agent
host computer.
• Compare the data in the packet against the Anti-Malware Scan Configuration to verify whether any of the data
related to files and folders on the Exclusion list.
• Analyze the packet within the context of traffic history and connection state.
47) When viewing the details for a policy, as displayed in the exhibit, you notice that the Application Control Protection
Module is not available. In this example, why would this Protection Modules not be available?
• The Application Control Protection Module is only supported on Linux computers, the policy details displayed are
for Windows computers only.
• An Activation Code for the Application Control Protection Module has not been provided. Unlicensed Protection
Modules will not be displayed.
• The Application Control Protection Module has been disabled at the Base Policy level and is not displayed in the
details for child policies.
• The Application Control Protection Modules has not been enabled for this tenant.
48) Where does Deep Security Manager store the credentials it uses to access the database?
• In the dsm.properties file
• In the database.properties file
• In the Windows Registry
• Deep Security Relays are able to process Deep Security Agent requests during updates.
49) Your organization would like to implement a mechanism to alert administrators when files on a protected servers are
modified or tampered with. Which Deep Security Protection Module should you enable to provide this functionality?
• The File Inspection Protection Module
• The Intrusion Prevention Protection Module
• The Integrity Monitoring Protection Module
• Deep Security can not provide this type of functionality
file:///D:/Siscotec/Trend/Deep Security 12/lmsilt_ quiz.html 14
/22
30/6/2020 lmsilt_ quiz.html
50) Which of the following statements is true regarding Maintenance Mode in the Application Control Protection Module?
• When in Maintenance Mode, the Application Control Protection Module will continue to block software identified in
Block rules, but will allow new and changed applications to be added to the software inventory.
• While in Maintenance Mode, all Block and Allow rules are ignored while new or updated applications are added to
the software inventory.
• When enabled, Maintenance Mode rescans the protected computer to rebuild the software inventory. Any new or
changed software will be included in this rebuilt inventory
• Maintenance Mode can be configured as a scheduled event. In this scenario, all software upgrades will be
performed at the same time every day to avoid creating alerts for normal software updates.
■
módulos de protección.
■
agentes de seguridad profunda durante las actualizaciones .
■
pueden promoverse a un relé de seguridad profunda.
■
profunda a las computadoras de punto final.
■
un dispositivo SIEM configurado.
■
notifique a las computadoras administradas las actualizaciones pendientes.
■
sospechosos.
With the highlighted setting enabled, Deep Security Agents will scan
files for viruses and malware using supplementary aggressive detection
■
pattern files.
With the highlighted setting enabled, Deep Security Agents will scan
files for known viruses and malware using patterns and any files deemed
suspicious will be submitted to a configured Deep Discovery Analyzer for
■
further analysis.
With the highlighted setting enabled, Deep Security Agents will scan
files for unknown malware using Predictive Machine Learning.
■
Security Manager in real time.
Log lnspection can only examine new Events and cannot examine logs
entries created befare the Protection Module was enabled.
Detect. This logs the triggering of the rule, but does not actually enforce the
■
block.
■
Security provides no protection beyond a record of events.
■
sanity check failing and the packet is being allowed to pass.
■
■
POST
PUT
■ GET
v1Ew
■
the managed computer.
■
including its relationship with Deep Security Manager.
■ Promote one of the Deep Security Agents on the air gapped computers to
become a Relay.
■ Smart Scan can be configured to use a local pattern file containing the
■
same information as the Smart Protection Network.
Smart Scan must contact the Smart Protection Network to function . Any
■
servers without Internet access will be unable to use Smart Scan.
lnstall a Smart Protection Server in the environment and set it as the source
far File Reputation information.
9 Which of the following are valid methods for forwarding Event information
from Deep Security? Select all that apply.
■
■
Deep Security Application Programming Interface (API)
■
■
Log lnspection , Application Control, and lntrusion Prevention
11 Which of the following file types would not be evaluated by the Application
Control Protection Module?
■
■
.exe files
.docx files
■ .class files
.py scripts
12 Which of the following correctly identifies the order of the steps used by the
Web Reputation Protection Module to determine if access to a web site
should be allowed?
■ 1. Checks the Deny list. 2. Checks the Approved list. 3. Checks the cache. 4. lf
not found in any of the above, retrieves the credibility score from
Rating Server. 5. Evaluates the credibility score against the Security Level to
■
determine if access to the web site should be allowed.
1. Checks the cache. 2. Checks the Approved list. 3. Checks the Deny
list. 4. lf not found in any of the above, retrieves the credibility score from the
Rating Server. 5. Evaluates the credibility score against the Security Level to
determine if access to the web site should be allowed.
list. 4. lf not found in any of the above, retrieves the credibility score from
Rating Server. 5. Evaluates the credibility score against the Security Level to
■
determine if access to the web site should be allowed.
1. Checks the Approved list. 2. Checks the Deny list. 3. Checks the cache. 4. lf
not found in any of the above, retrieves the credibility score from the Rating
Server. 5. Evaluates the credibility score against the Security Level to determine if
access to the web site should be allowed.
■
requests.
■
a un clon.
■
Manager puede manejar todas las solicitudes si falla la primera.
■
■
Prevención de intrusiones
Cortafuegos
■ Reputación web
Monitoreo de integridad
Prevención de intrusiones
■ Inspección de registro
Cortafuegos
■
protección se activaron a nivel de computadora.
■
predeterminada en la Política básica.
■
en Deep Security Agent.
■
Security Manager o mediante un script de implementación.
■
sistema en la computadora de Deep Security Manager.
18 añds nivel de seguridad para la reputación web en una política está establecido
en Alto. Un servidor asignado a esta política intenta acceder a un sitio web
con un puntaje de credibilidad de 78. ¿Cuál es el resultado?
■
de conexión como un evento.
■
muestra una página de error en el navegador web.
■
los agentes de seguridad profunda en cada instante.
■
utilizando el estándar de seguridad de código abierto (OSSEC).
parche del sistema operativo. ¿Cómo puede determinar qué reglas de prevención de
intrusiones ya no son necesarias en este servidor?
■
que la vulnerabilidad se corrigió con el parche.
■
se corrigió con el parche.
■
permanecer en su lugar sin afectar el sistema.
21 Según los detalles del evento que se muestra en la exposición, ¿cuál de las
siguientes afirmaciones es falsa?
■
habilitados para detectar exploraciones de reconocimiento.
■
blanca de reconocimiento.
■
tráfico desde la dirección IP de origen.
■
licencia no se mostrarán.
■
secundarias.
■
para este inquilino.
■
Windows.
■
protección inteligente.
■
intrusiones.
■
no hubiera un agente de seguridad profundo.
■
eventos de registro.
■
■
Deep Security no puede proporcionar este tipo de funcionalidad
■
inteligente instalado localmente.
■
servidor de protección inteligente instalado localmente.
■
utilizar el servidor de protección inteligente instalado localmente.
■
conocidas.
■
convencional debe activarse manualmente o ejecutarse en un horario.
■
aprobarán automáticamente .
■
actualizaciones.
■
inventario para incorporar software modificado.
■
protocolo.
■
inesperados .
■
encabezado, incluidos los detalles del origen y el destino del paquete.
■ Forzar permiso permite que pase el tráfico que de otro modo sería
denegado por otras reglas de Firewall, pero que aún impone el filtrado por
■
el Módulo de protección de prevención de intrusiones.
Force Allow permite explícitamente que pase el tráfico que coincide con
■
la regla de Firewall y niega implícitamente el resto del tráfico.
■
archivo de base de datos de inventario (ac.db) de la computadora fuente .
■
computadora.
■
inventario desde la pestaña Detalles para cada computadora individual.
■
■
VMware vRealize
VMware NSX
■ VMware ESXi
VMware vCenter
■
■
Derivación
Permitir
■ Permitir fuerza
Negar
■
Netweaver.
■
Se requiere Deep Security Scanner.
■
los módulos de protección de control de aplicaciones y reputación web.
■
de protección de control de aplicaciones y reputación web.
■
Protección y, como resultado, se muestran con anulaciones.
■
registro de Windows.
■
contenido que puede indicar un ataque.
■
paquetes de datos.
■
temporalmente.
■
aplicaciones.
■
software permitido en el conjunto de reglas actualmente activo.
38 Su entorno VMware está configurado sin usar NSX. ¿Cómo puede Deep
Security proporcionar protección a las imágenes virtuales alojadas en sus
servidores ESXi?
Sin NSX, no podrá utilizar Deep Security para proteger sus máquinas
■
virtuales.
■
prevención de intrusiones, el firewall y la reputación web
■
máquina virtual alojada en el servidor ESXi.
■
recomendación en la computadora protegida es malicioso.
■
como parte de una operación legítima.
■
Monitoreo de Integridad.
■
■
Escáner de seguridad profunda
■
caché.
■
durante la vida útil de la caché.
■
credibilidad.
■
Manager sin afectar la configuración original.
■
dsm.properties tras la inicialización de Deep Security Manager.
■
TCP y UPO.
■
servidor.
■
maliciosos pero no puede restablecer la conexión.
■
módulo de protección contra malware.
■ Las reglas que se muestran en la exposición han sido codificadas con los
detalles de la política. Estas reglas se asignarán automáticamente a
■
todas las políticas de Firewall que se creen y no se pueden asignar.
■
se pueden asignar en el nivel secundario.
■
asignación de reglas.
46 ¿Dónde almacena Deep Security Manager las credenciales que usa para
acceder a la base de datos?
■
■
En el archivo logging.properties
En el registro de Windows
■ En el archivo database.properties
En el archivo dsm.properties
■
adecuado para el análisis.
■
y carpetas en la lista de Exclusión.
■
estado de la conexión.
■
programado.
■
secundarias o directamente a las computadoras.
■
reglas recomendadas aplicar.
■
■
ClaveAPI
■
Contraseña de administrador
Versión API
■
de malware en una máquina virtual que
aparecen en otras máquinas virtuales
pueden no necesitar ser escaneados
nuevamente.
El almacenamiento en caché de
escaneo gestiona el uso de recursos al
■
escalonar el lanzamiento de escaneas de
malware para evitar tormentas de escaneo
■
basadas en agentes y no se admite en una implementación sin agentes.
El almacenamiento en caché de
escaneo mantiene las listas de inclusiones
y exclusiones de la configuración de
escaneo de malware en la memoria para
mejorar el rendimiento.