Shared Flashcard Set

Details

FCP
Yo Gabba Gabba!
39
Language - Dutch
Not Applicable
11/04/2018

Additional Language - Dutch Flashcards

 


 

Cards

Term
What actions can you apply when enforcing policies related to cloud applications? (Choose two)

- Monitor Only

- Permit (V)

- Basic Security

- Block
Definition
- Block
Term
When Installing the Log Database, which of the following is true?

- Installation creates the Log Database with a catalog database and one database partition

- Installation creates the Log Database with a partition database

- Installation creates the Log Database with a catalog database and two partitions

- Installation creates the Log Database with a catalog database
Definition
- Installation creates the Log Database with a catalog database and one database partition
Term
Which four add-on modules are available for Web Security? Choose four:

- Forcepoint Web DLP

- Forcepoint DLP

- Forcepoint Web Hybrid Platform

- Forcepoint Mobile Security

- Forcepoint Email Security

- Forcepoint Cloud Sandbox
Definition
- Forcepoint Web DLP

- Forcepoint Web Hybrid Platform

- Forcepoint Mobile Security

- Forcepoint Cloud Sandbox
Term
What five pieces of data can you find in Log Server cache files? Choose five:

- SMTP Headers

- HTTP Headers

- Protocol

- User FQDN

- Timestamp

- Source IP
Definition
- HTTP Headers

- Protocol

- User FQDN

- Timestamp

- Source IP
Term
Which functionality allows requests to Office 365 applications to bypass the authentication process configure….

- Authentication Bypass

- Content Gateway Bypass

- Office 365 Bypass

- Decryption Bypass
Definition
- Authentication Bypass
Term
What is the name of the Web Security graphical user interface (GUI)?

- Forcepoint Management Console

- Forcepoint Security Manager

- Forcepoint Unified Manager

- Forcepoint Security Console
Definition
- Forcepoint Security Manager
Term
What is the name of the feature that allows Real-Time Content categorization to achieve better coverage…

- URL Link Analytics

- URL Link Analysis and Classification

- URL Link Analysis

- URL Link Classification
Definition
- URL Link Analysis
Term
What is the default quota session time (configured via the Settings > General > Filtering page)?

- 2 minutes

- 5 minutes

- 10 minutes

- 4 minutes
Definition
- 10 minutes
Term
What happens if the connection between the Policy Server and the Policy Broker it is using is temporarily broken?

- Policy Server asks primary Policy Broker to assign the new broker.

- Policy Server is unaffected by a single failure, because….

- Policy Server picks the next Policy Broker from the priority list, and returns back to the original Policy Broker within 30 seconds, if the connection attempt…

- Policy Server picks the next Policy Broker from the priority list, and keeps using it until it is restarted.
Definition
- Policy Server picks the next Policy Broker from the priority list, and keeps using it until it is restarted.
Term
Which Relational Database Management System is used by the policy Broker to Store policy data?

- Microsoft SQL Server Express

- PostgreSQL

- Microsoft SQL Server

- Oracle RDBMS

- MySQL
Definition
- PostgreSQL
Term
What are the filters available in Web Security? Choose two:

- Protocol Filters

- Category Filters

- Cloud app filters

- Timeline filters

- OCR Filters
Definition
- Protocol Filters

- Category Filters
Term
Which of the following statement is true about the Protected Cloud App feature?

- This feature allows single sign-on from Security Manager into Forcepoint Content Gateway for detailed configuration, reporting, and incident management.

- This feature allows single sign-on from Security Manager into Forcepoint Security Appliance Manager for detailed configuration, reporting, and incident management.

- This feature allows single sign-on from Security Manager into the Forcepoint CASB management portal for detailed configuration, reporting, and incident management.

- This feature allows single sign-on from the Forcepoint Security Appliance Manager into Security Manager for detailed configuration, reporting, and incident management.
Definition
- This feature allows single sign-on from Security Manager into the Forcepoint CASB management portal for detailed configuration, reporting, and incident management.
Term
Which two of the following statements describe manual user authentication? (choose two)

- When manual authentication is enabled, users access is blocked if they make two failed attempts to enter the password.

- Manual authentication prompts for a user name, password, and two-factor authentication.

- Manual authentication prompts users for a user name and password the first time they access the internet through a browser.

- When manual authentication is enabled, users who cannot be identified are prevented from browsing the internet.
Definition
- Manual authentication prompts users for a user name and password the first time they access the internet through a browser.

- When manual authentication is enabled, users who cannot be identified are prevented from browsing the internet.
Term
Which of the following interfaces allow you to configure the settings of supported Forcepoint…..

- Content Gateway Manager

- Forcepoint Security Appliance Manager

- Security Manager

- Appliance CLI

- Forcepoint Central Appliance Manager
Definition
- Appliance CLI

- Forcepoint Security Appliance Manager
Term
Which integration does Web Security feature that provides extended visibility and control to cloud applications?

- Forcepoint DLP

- Forcepoint Content Gateway

- Forcepoint Web Cloud

- Forcepoint CASB
Definition
- Forcepoint CASB
Term
Which Windows-only component is required to enable the reporting features of Web Security

- Log Manager

- Log Server

- Sync Service

- Security Manager
Definition
- Log Server
Term
Which concern is NOT relevant, when considering Policy Broker replication?

- Avoiding single point of failure

- Mitigating slow WAN speeds in geographically distributed deployments

- Improving performance by allowing load balancing

- Allowing Policy Broker to run as a virtual machine
Definition
- Allowing Policy Broker to run as a virtual machine
Term
Which configuration file allows you to configure Web Security to manager requests based on custom categorization (reg…

- eim_server.ini

- eimserver.config

- eimserver.ini

- eim_server.config
Definition
- eimserver.ini
Term
Which module can Web Security customers use to manage Internet activity for users outside the network, regardless of…

- This functionality is not possible

- Web DLP module

- Web Hybrid module

- Remote Filtering module
Definition
- Web Hybrid module
Term
Name two ways on how Web Security sends alerts. (Choose two)

- Via SMS

- Via chat

- Via SNMP

- Via email
Definition
- Via SNMP

- Via email
Term
Which component communicates with the organization’s directory service to convey user-related information to the Policy Server?

- Usage Monitor

- User Service

- Transparent identification agent

- Sync Server
Definition
- User Service
Term
If a file is sandboxed, what will be the result for the end user?

- No impact on file downloading in client side.

- Client will get a message that the file is sent for sandboxing.

- Client will get the block page.

- Client will be able to receive the file partially—in trickling mode, while it is being analyzed.
Definition
- No impact on file downloading in client side.
Term
Which component is responsible for identifying other Web Security components and tracking their status?

- Policy Broker

- Network Agent

- Policy Server

- Filtering Service
Definition
- Policy Server
Term
Which of the following statements are true about Content Gateway Bypass? (Choose two)

- Content Gateway Bypass is only supported for explicit proxy deployments only.

- With Content Gateway Bypass, requests to Office 365 application will completely bypass Content Gateway.

- With Content Gateway Bypass, authentication requests to Office 365 and other cloud applications will completely bypass the Content Gateway.

- Content Gateway Bypass is only supported for transparent proxy deployments only.
Definition
- Content Gateway Bypass is only supported for transparent proxy deployments only.

- With Content Gateway Bypass, requests to Office 365 application will completely bypass Content Gateway.
Term
Which three components provide policy enforcement for off-site users…

- Network Agent

- RADIUS Agent

- DC Agent

- Web Filtering & Security Remote Filter
Definition
- RADIUS Agent

- DC Agent

- Web Filtering & Security Remote Filter
Term
What happens when the subscription expires in all Web Security deployments?

- There is a message that prompts you to increase your subscription limit.

- Traffic is permitted or blocked based on the “Block users when subscription expires” setting.

- Traffic is permitted regardless of the “Block users when subscription expires” setting.

- There is no change in policy enforcement.
Definition
- Traffic is permitted or blocked based on the “Block users when subscription expires” setting.
Term
Which of the following capabilities are possible when using Forcepoint Security Appliance Manager? (Choose two)

- Configure all appliance settings

- View, add, or delete Forcepoint physical and/or virtual appliances

- View, add, or delete Forcepoint V/X series appliances

- Configure some appliance settings
Definition
- Configure some appliance settings

- View, add, or delete Forcepoint physical and/or virtual appliances
Term
Which administrator can create delegated administration and reporting roles?

- Global Security Administrator

- Super Operator

- Super Administrator

- admin
Definition
- Super Administrator
Term
Which two components must be installed first when deploying Web Security? Choose two

- Policy Server

- Content Gateway

- Policy Broker

- Security Manager
Definition
- Policy Broker

- Policy Server
Term
Which component provides policy enforcement in your network?

- Web DLP

- Content Gateway

- Filtering Service

- Network Agent
Definition
- Filtering Service
Term
Which of the following are supported as part of the third-party integration in Web Security 8.x? (choose four)

- Office 365

- Citrix

- Cisco ASA or routers

- ICAP Service

- Microsoft Forefront TMG
Definition
- Citrix

- Cisco ASA or routers

- ICAP Service

- Microsoft Forefront TMG
Term
Select the two descriptions that best describe Content Gateway. Choose two

- Like Network Agent, Content Gateway is a Proxy through which clients connect to Web content.

- Content Gateway is a proxy through which clients connect to Web content.

- Content Gateway provides visibility into SSL encrypted Web traffic.

- Content Gateway provides the same functionalities as Network Agent.
Definition
- Content Gateway provides visibility into SSL encrypted Web traffic.

- Content Gateway is a proxy through which clients connect to Web content.
Term
What is the feature that you can enable to allow end users to view investigative reports on their personal Internet usage?

- End-user reporting

- Self-reporting

- Personalized reporting

- Big brother reporting
Definition
- Self-reporting
Term
When installing additional web protection components, which three of the following practices are true? (Choose three)

- Most components can reside on Linux servers.

- Most components can reside on Forcepoint appliances.

- In Web Security 8.X, most components can support Mac OS releases.

- All components, except Content Gateway, can reside on Windows servers.
Definition
- Most components can reside on Linux servers.

- Most components can reside on Forcepoint appliances.

- All components, except Content Gateway, can reside on Windows servers.
Term
Which two-factor authentication method is available in Security Manager?

- Authentication by RSA SecurID

- Authentication by Common Access Cards

- Authentication by admin password plus a client SSL certificate

- Authentication by admin password plus a code card
Definition
- Authentication by RSA SecurID
Term
When backing up Security Manager, which of the following files are created in the EIP….(Choose 3)

- ca.cer

- config.log

- DataBackup.xml

- EIP.db

- backup.txt
Definition
- EIP.db

- backup.txt

- ca.cer
Term
What is the component that houses the category and protocol definitions that provide the first step in enhancing Inter…

- Master Database

- Web Security Database

- Forcepoint Database Master

- Forcepoint Database
Definition
- Master Database
Term
Which of the following statements is true about Report Center?

- Report Center allows multi-level, flexible reports that can be used for analysis of logging data?including cloud apps data.

- Report Center replaces the Investigative Reports found in previous versions of the product.

- Report Center replaces the legacy reporting features in Web Security

- Report Center is an add-on component.

- Report Center provides reporting capabilities since the release of Web Security 8.4.
Definition
- Report Center allows multi-level, flexible reports that can be used for analysis of logging data?including cloud apps data.
Term
Select all three Policy Broker modes. Choose three

- Replica

- Monitor

- Primary

- Standalone
Definition
- Primary

- Standalone

- Replica
Supporting users have an ad free experience!