Download IBM.C2150-620.ExamLabs.2019-03-14.36q.tqb

Vendor: IBM
Exam Code: C2150-620
Exam Name: IBM Security Network Protection (XGS) V5.3.2 System Administration
Date: Mar 14, 2019
File Size: 2 MB

Demo Questions

Question 1
A System Administrator has been seeing a lot of SSLv2-Weak_Cipher attacks reported on the network and wants to increase the severity of the events. 
How can this be accomplished?
  1. Modify the Threat Level of the signature.
  2. Create an Incident in SiteProtector for SSLv2_Weak Cipher.
  3. Modify the Event Log response for the Intrusion Preventions Object.
  4. increase the X-Force Protection Level for the Intrusion Prevention Object.
Correct answer: D
Explanation:
What do the various Protection Levels in the X-Force Virtual Patch and Trust X-Force Defaults mean? Note: Intrusion Prevention Object – Threat level protectionX-Force Virtual Patch Protection Levels None Do not enable any signatures by default. This option is for a user that wants complete control over which signatures get enabled. Moderate The moderate policy enables most attack events for a good level of security protection with minimal chance of false alarms. The moderate policy is designed for users who intermittently monitor security events and minimally manage the IPS configuration. Aggressive The aggressive policy enables a high percentage of attack events for a high level of security protection with a chance of false alarms. The aggressive policy is designed for users who perform testing and tuning before IPS deployment, and who closely monitor security events and occasionally fine-tune the IPS configuration. Paranoid The paranoid policy enables almost all attack events (including events from the latest XPUs) for a very high level of security protection with significant chance of false alarms. The paranoid policy is designed for users who perform considerable testing and tuning before IPS or XPU deployment, and who closely monitor security events and frequently fine-tune the IPS configuration. References: http://www-01.ibm.com/support/docview.wss?uid=swg21701441
What do the various Protection Levels in the X-Force Virtual Patch and Trust X-Force Defaults mean? 
Note: Intrusion Prevention Object – Threat level protection
X-Force Virtual Patch Protection Levels 
  • None 
    Do not enable any signatures by default. This option is for a user that wants complete control over which signatures get enabled. 
  • Moderate 
    The moderate policy enables most attack events for a good level of security protection with minimal chance of false alarms. The moderate policy is designed for users who intermittently monitor security events and minimally manage the IPS configuration. 
  • Aggressive 
    The aggressive policy enables a high percentage of attack events for a high level of security protection with a chance of false alarms. The aggressive policy is designed for users who perform testing and tuning before IPS deployment, and who closely monitor security events and occasionally fine-tune the IPS configuration. 
  • Paranoid 
The paranoid policy enables almost all attack events (including events from the latest XPUs) for a very high level of security protection with significant chance of false alarms. The paranoid policy is designed for users who perform considerable testing and tuning before IPS or XPU deployment, and who closely monitor security events and frequently fine-tune the IPS configuration. 
References: http://www-01.ibm.com/support/docview.wss?uid=swg21701441
Question 2
A System Administrator is preparing to manage an XGS appliance using the SiteProtector System. 
Which three management actions can be performed? (Choose three.)
  1. Apply a snapshot.
  2. Restart the appliance.
  3. Configure Static Routes.
  4. Create a Firmware backup.
  5. Manage the Appliance SSL Certificate.
  6. Change the Flexible Performance Level.
Correct answer: ADE
Question 3
A Security Administrator wants to enable a block page to alert users when they attempt to access HTTP websites that are blocked due to a Network Access policy (NAP) rule. 
How should the Administrator achieve this?
  1. Add a NAP rule with an action of Drop.
  2. Add a NAP rule with an action of Reject.
  3. Add a NAP rule that has an action of Do Not inspect and then set the response object to Block Page.
  4. Add a NAP rule with an action of Reject (Authenticate) and then create a special user group that has default action of Block HTTP.
Correct answer: C
EXAM SIMULATOR

How to Open TQB Files?

Use Taurus Exam Simulator to open TQB files

Taurus Exam Simulator


Taurus Exam Simulator for Windows/macOS/Linus

Download

Taurus Exam Studio
Enjoy a 20% discount on Taurus Exam Studio!

You now have the chance to acquire Exam Studio at a discounted rate of 20%.

Get Now!