A. After the guest VM is moved to a security tag group
B. As soon as the malware protection policy is applied
C. As soon as the NSX security policy is applied
D. After the clean completion of entire guest VM scan
A. Polling interval: 30-60 minutes; default listening port: disabled
B. Polling interval: 5-15 minutes; default listening port: enabled
C. Polling interval: 5-15 minutes; default listening port: disabled
D. Polling interval: 30-60 minutes; default listening port: enabled
A. After the pilot deployment, polling intervals should be decreased to avoid overloading the server.
B. Increase the polling interval as large numbers of systems that poll too frequently can fill the database.
C. The polling intervals should be decreased for large scale deployments to improve the performance of report generation.
D. High risk systems require fast reaction time and should be set to poll more often.
E. Many agents require fewer policy or configuration changes so it is unnecessary to check as frequently.
A. Prevention
B. Management
C. Detection
D. Profile
A. When log rotation is enabled on the agent system
B. To see all prevention events in real-time
C. When third party solutions are unable to process the aggregated events correctly
D. To provide easier detection of threats during an outbreak
E. To see all detection events in real-time
A. Systems whose policy and configuration are subject to compliance requirements
B. Systems that rely on the polling interval to update the agent
C. Systems whose policy and configuration are relatively stable and that are consistent within the deployment
D. Systems whose policy and configuration are relatively stable, but need a fast reaction time to infrequent policy or configuration changes
A. The intrusion protection service is immediately stopped
B. Agent-manager communication is stopped
C. The intrusion protection service is stopped after reboot
D. The agent can still communicate with the manager, but logs will fail to be uploaded
A. .TXT
B. .CSV
C. .ZIP
D. .LOG
A. Allow the current user to override the applied prevention policy
B. Install a new agent certificate
C. Enable the use of Event Viewer on the agent
D. Restart the IPS Service
A. SSL
B. LUA
C. IPSEC
D. SHA-256