Term
What actions can you apply when enforcing policies related to cloud applications? (Choose two)
- Monitor Only
- Permit (V)
- Basic Security
- Block |
|
Definition
|
|
Term
When Installing the Log Database, which of the following is true?
- Installation creates the Log Database with a catalog database and one database partition
- Installation creates the Log Database with a partition database
- Installation creates the Log Database with a catalog database and two partitions
- Installation creates the Log Database with a catalog database |
|
Definition
- Installation creates the Log Database with a catalog database and one database partition |
|
|
Term
Which four add-on modules are available for Web Security? Choose four:
- Forcepoint Web DLP
- Forcepoint DLP
- Forcepoint Web Hybrid Platform
- Forcepoint Mobile Security
- Forcepoint Email Security
- Forcepoint Cloud Sandbox |
|
Definition
- Forcepoint Web DLP
- Forcepoint Web Hybrid Platform
- Forcepoint Mobile Security
- Forcepoint Cloud Sandbox |
|
|
Term
What five pieces of data can you find in Log Server cache files? Choose five:
- SMTP Headers
- HTTP Headers
- Protocol
- User FQDN
- Timestamp
- Source IP |
|
Definition
- HTTP Headers
- Protocol
- User FQDN
- Timestamp
- Source IP |
|
|
Term
Which functionality allows requests to Office 365 applications to bypass the authentication process configure….
- Authentication Bypass
- Content Gateway Bypass
- Office 365 Bypass
- Decryption Bypass |
|
Definition
|
|
Term
What is the name of the Web Security graphical user interface (GUI)?
- Forcepoint Management Console
- Forcepoint Security Manager
- Forcepoint Unified Manager
- Forcepoint Security Console |
|
Definition
- Forcepoint Security Manager |
|
|
Term
What is the name of the feature that allows Real-Time Content categorization to achieve better coverage…
- URL Link Analytics
- URL Link Analysis and Classification
- URL Link Analysis
- URL Link Classification |
|
Definition
|
|
Term
What is the default quota session time (configured via the Settings > General > Filtering page)?
- 2 minutes
- 5 minutes
- 10 minutes
- 4 minutes |
|
Definition
|
|
Term
What happens if the connection between the Policy Server and the Policy Broker it is using is temporarily broken?
- Policy Server asks primary Policy Broker to assign the new broker.
- Policy Server is unaffected by a single failure, because….
- Policy Server picks the next Policy Broker from the priority list, and returns back to the original Policy Broker within 30 seconds, if the connection attempt…
- Policy Server picks the next Policy Broker from the priority list, and keeps using it until it is restarted. |
|
Definition
- Policy Server picks the next Policy Broker from the priority list, and keeps using it until it is restarted. |
|
|
Term
Which Relational Database Management System is used by the policy Broker to Store policy data?
- Microsoft SQL Server Express
- PostgreSQL
- Microsoft SQL Server
- Oracle RDBMS
- MySQL |
|
Definition
|
|
Term
What are the filters available in Web Security? Choose two:
- Protocol Filters
- Category Filters
- Cloud app filters
- Timeline filters
- OCR Filters |
|
Definition
- Protocol Filters
- Category Filters |
|
|
Term
Which of the following statement is true about the Protected Cloud App feature?
- This feature allows single sign-on from Security Manager into Forcepoint Content Gateway for detailed configuration, reporting, and incident management.
- This feature allows single sign-on from Security Manager into Forcepoint Security Appliance Manager for detailed configuration, reporting, and incident management.
- This feature allows single sign-on from Security Manager into the Forcepoint CASB management portal for detailed configuration, reporting, and incident management.
- This feature allows single sign-on from the Forcepoint Security Appliance Manager into Security Manager for detailed configuration, reporting, and incident management. |
|
Definition
- This feature allows single sign-on from Security Manager into the Forcepoint CASB management portal for detailed configuration, reporting, and incident management. |
|
|
Term
Which two of the following statements describe manual user authentication? (choose two)
- When manual authentication is enabled, users access is blocked if they make two failed attempts to enter the password.
- Manual authentication prompts for a user name, password, and two-factor authentication.
- Manual authentication prompts users for a user name and password the first time they access the internet through a browser.
- When manual authentication is enabled, users who cannot be identified are prevented from browsing the internet. |
|
Definition
- Manual authentication prompts users for a user name and password the first time they access the internet through a browser.
- When manual authentication is enabled, users who cannot be identified are prevented from browsing the internet. |
|
|
Term
Which of the following interfaces allow you to configure the settings of supported Forcepoint…..
- Content Gateway Manager
- Forcepoint Security Appliance Manager
- Security Manager
- Appliance CLI
- Forcepoint Central Appliance Manager |
|
Definition
- Appliance CLI
- Forcepoint Security Appliance Manager |
|
|
Term
Which integration does Web Security feature that provides extended visibility and control to cloud applications?
- Forcepoint DLP
- Forcepoint Content Gateway
- Forcepoint Web Cloud
- Forcepoint CASB |
|
Definition
|
|
Term
Which Windows-only component is required to enable the reporting features of Web Security
- Log Manager
- Log Server
- Sync Service
- Security Manager |
|
Definition
|
|
Term
Which concern is NOT relevant, when considering Policy Broker replication?
- Avoiding single point of failure
- Mitigating slow WAN speeds in geographically distributed deployments
- Improving performance by allowing load balancing
- Allowing Policy Broker to run as a virtual machine |
|
Definition
- Allowing Policy Broker to run as a virtual machine |
|
|
Term
Which configuration file allows you to configure Web Security to manager requests based on custom categorization (reg…
- eim_server.ini
- eimserver.config
- eimserver.ini
- eim_server.config |
|
Definition
|
|
Term
Which module can Web Security customers use to manage Internet activity for users outside the network, regardless of…
- This functionality is not possible
- Web DLP module
- Web Hybrid module
- Remote Filtering module |
|
Definition
|
|
Term
Name two ways on how Web Security sends alerts. (Choose two)
- Via SMS
- Via chat
- Via SNMP
- Via email |
|
Definition
|
|
Term
Which component communicates with the organization’s directory service to convey user-related information to the Policy Server?
- Usage Monitor
- User Service
- Transparent identification agent
- Sync Server |
|
Definition
|
|
Term
If a file is sandboxed, what will be the result for the end user?
- No impact on file downloading in client side.
- Client will get a message that the file is sent for sandboxing.
- Client will get the block page.
- Client will be able to receive the file partially—in trickling mode, while it is being analyzed. |
|
Definition
- No impact on file downloading in client side. |
|
|
Term
Which component is responsible for identifying other Web Security components and tracking their status?
- Policy Broker
- Network Agent
- Policy Server
- Filtering Service |
|
Definition
|
|
Term
Which of the following statements are true about Content Gateway Bypass? (Choose two)
- Content Gateway Bypass is only supported for explicit proxy deployments only.
- With Content Gateway Bypass, requests to Office 365 application will completely bypass Content Gateway.
- With Content Gateway Bypass, authentication requests to Office 365 and other cloud applications will completely bypass the Content Gateway.
- Content Gateway Bypass is only supported for transparent proxy deployments only. |
|
Definition
- Content Gateway Bypass is only supported for transparent proxy deployments only.
- With Content Gateway Bypass, requests to Office 365 application will completely bypass Content Gateway. |
|
|
Term
Which three components provide policy enforcement for off-site users…
- Network Agent
- RADIUS Agent
- DC Agent
- Web Filtering & Security Remote Filter |
|
Definition
- RADIUS Agent
- DC Agent
- Web Filtering & Security Remote Filter |
|
|
Term
What happens when the subscription expires in all Web Security deployments?
- There is a message that prompts you to increase your subscription limit.
- Traffic is permitted or blocked based on the “Block users when subscription expires” setting.
- Traffic is permitted regardless of the “Block users when subscription expires” setting.
- There is no change in policy enforcement. |
|
Definition
- Traffic is permitted or blocked based on the “Block users when subscription expires” setting. |
|
|
Term
Which of the following capabilities are possible when using Forcepoint Security Appliance Manager? (Choose two)
- Configure all appliance settings
- View, add, or delete Forcepoint physical and/or virtual appliances
- View, add, or delete Forcepoint V/X series appliances
- Configure some appliance settings |
|
Definition
- Configure some appliance settings
- View, add, or delete Forcepoint physical and/or virtual appliances |
|
|
Term
Which administrator can create delegated administration and reporting roles?
- Global Security Administrator
- Super Operator
- Super Administrator
- admin |
|
Definition
|
|
Term
Which two components must be installed first when deploying Web Security? Choose two
- Policy Server
- Content Gateway
- Policy Broker
- Security Manager |
|
Definition
- Policy Broker
- Policy Server |
|
|
Term
Which component provides policy enforcement in your network?
- Web DLP
- Content Gateway
- Filtering Service
- Network Agent |
|
Definition
|
|
Term
Which of the following are supported as part of the third-party integration in Web Security 8.x? (choose four)
- Office 365
- Citrix
- Cisco ASA or routers
- ICAP Service
- Microsoft Forefront TMG |
|
Definition
- Citrix
- Cisco ASA or routers
- ICAP Service
- Microsoft Forefront TMG |
|
|
Term
Select the two descriptions that best describe Content Gateway. Choose two
- Like Network Agent, Content Gateway is a Proxy through which clients connect to Web content.
- Content Gateway is a proxy through which clients connect to Web content.
- Content Gateway provides visibility into SSL encrypted Web traffic.
- Content Gateway provides the same functionalities as Network Agent. |
|
Definition
- Content Gateway provides visibility into SSL encrypted Web traffic.
- Content Gateway is a proxy through which clients connect to Web content. |
|
|
Term
What is the feature that you can enable to allow end users to view investigative reports on their personal Internet usage?
- End-user reporting
- Self-reporting
- Personalized reporting
- Big brother reporting |
|
Definition
|
|
Term
When installing additional web protection components, which three of the following practices are true? (Choose three)
- Most components can reside on Linux servers.
- Most components can reside on Forcepoint appliances.
- In Web Security 8.X, most components can support Mac OS releases.
- All components, except Content Gateway, can reside on Windows servers. |
|
Definition
- Most components can reside on Linux servers.
- Most components can reside on Forcepoint appliances.
- All components, except Content Gateway, can reside on Windows servers. |
|
|
Term
Which two-factor authentication method is available in Security Manager?
- Authentication by RSA SecurID
- Authentication by Common Access Cards
- Authentication by admin password plus a client SSL certificate
- Authentication by admin password plus a code card |
|
Definition
- Authentication by RSA SecurID |
|
|
Term
When backing up Security Manager, which of the following files are created in the EIP….(Choose 3)
- ca.cer
- config.log
- DataBackup.xml
- EIP.db
- backup.txt |
|
Definition
- EIP.db
- backup.txt
- ca.cer |
|
|
Term
What is the component that houses the category and protocol definitions that provide the first step in enhancing Inter…
- Master Database
- Web Security Database
- Forcepoint Database Master
- Forcepoint Database |
|
Definition
|
|
Term
Which of the following statements is true about Report Center?
- Report Center allows multi-level, flexible reports that can be used for analysis of logging data?including cloud apps data.
- Report Center replaces the Investigative Reports found in previous versions of the product.
- Report Center replaces the legacy reporting features in Web Security
- Report Center is an add-on component.
- Report Center provides reporting capabilities since the release of Web Security 8.4. |
|
Definition
- Report Center allows multi-level, flexible reports that can be used for analysis of logging data?including cloud apps data. |
|
|
Term
Select all three Policy Broker modes. Choose three
- Replica
- Monitor
- Primary
- Standalone |
|
Definition
- Primary
- Standalone
- Replica |
|
|