IBM C2150-620 - IBM Security Network Protection (XGS) V5.3.2 System Administration Exam

Question #1 (Topic: Topic 1)
A System Administrator has been seeing a lot of SSLv2-Weak_Cipher attacks reported on the network and wants to increase the severity of the events.
How can this be accomplished?
A. Modify the Threat Level of the signature. B. Create an Incident in SiteProtector for SSLv2_Weak Cipher. C. Modify the Event Log response for the Intrusion Preventions Object. D. increase the X-Force Protection Level for the Intrusion Prevention Object.
Answer: Answer: For Security Network IPS (GX) sensors, there is an X-Force Virtual Patch policy that is used to determine which signatures are enabled by default (this
Question #2 (Topic: Topic 1)
A System Administrator wants to configure an XGS so that when the SSH_Brute_Force security event is triggered against machine Server1, any further traffic
from the source IP address contained in the security event alert is dropped for a timed period.
How should the System Administrator configure the XGS to perform this?
A. Edit the properties of the SSH_Brute_Force security event and create a quarantine response to block the source IP. B. Create a Network Access policy object to drop all traffic from the source IP contained in the security event alert to Server1. C. Create a Network Access policy object with a quarantine rule to block the source IP when the security event is triggered against Server1. D. Create an IPS Filter policy object for the SSH_Brute_Force security event with a Victim address of Server1 and a quarantine response to block the source IP
Answer: C
Question #3 (Topic: Topic 1)
A System Administrator is preparing to manage an XGS appliance using the SiteProtector System.
Which three management actions can be performed? (Choose three.)
A. Apply a snapshot. B. Restart the appliance. C. Configure Static Routes. D. Create a Firmware backup. E. Manage the Appliance SSL Certificate. F. Change the Flexible Performance Level.
Answer: ADE
Question #4 (Topic: Topic 1)
A Security Administrator wants to enable a block page to alert users when they attempt to access HTTP websites that are blocked due to a Network Access policy
(NAP) rule.
How should the Administrator achieve this?
A. Add a NAP rule with an action of Drop. B. Add a NAP rule with an action of Reject. C. Add a NAP rule that has an action of Do Not inspect and then set the response object to Block Page. D. Add a NAP rule with an action of Reject (Authenticate) and then create a special user group that has default action of Block HTTP.
Answer: C
Question #5 (Topic: Topic 1)
The System Administrator has discovered the XGS device is overloaded and is dropping legitimate traffic.
Which setting is likely responsible for this behavior?
A. Unanalyzed policy configuration B. TCP resets- TCP reset interface C. Fail Closed hardware bypass mode D. LogDB response enabled on NAP rules
Answer: A
Download Exam
Page: 1 / 12
Total 60 questions