Pass IBM C2150-620 Exam Easily With Questions And Answers – [Sep-2017 Dumps]
New Updated C2150-620 Exam Questions from DumpsSchool C2150-620 PDF dumps! Welcome to download the newest DumpsSchool C2150-620 VCE dumps: https://www.dumpsschool.com/C2150-620-exam-dumps.html
Keywords: C2150-620 exam dumps, C2150-620 exam questions, C2150-620 VCE dumps, C2150-620 PDF dumps, C2150-620 practice tests, C2150-620 study guide, C2150-620 braindumps
IBM Security Network Protection (XGS) V5.3.2 Network Administration certification exam as a profession has an extraordinary evolution over the last few years. IBM C2150-620 IBM Security Network Protection (XGS) V5.3.2 System Administration exam is the forerunner in validating credentials against. Here are updated IBM C2150-620 exam questions, which will help you to test the quality features of DumpsSchool exam preparation material completely free. You can purchase the full product once you are satisfied with the product.
A System Administrator has been seeing a lot of SSLv2_Weak_Cipher attacks reported on the network and wants to Increase the severity of the events.
How can this be accomplished?
A. Modify the Threat Level of the signature
B. Create an Incident in SiteProtector for SSLv2_Weak_Cipher
C. Modify the Event Log response for the Intrusion Prevention Object
D. Increase the X-Force Protection Level for the Intrusion Prevention Object
A system Administrator wants to configure an XGS so that when the SSH_Brute_Force security event is triggered against machine Server1, any further traffic from the source IP address contained in the security event alert is dropped for a time period.
How should the System Administrator configure the XGS to perform this?
A. Edit the properties of the SSH_Brute_Force security event and create a quarantine response to block the source IP
B. Create a Network Access policy object to drop all traffic from the source IP contained in the security event alert to Server1
C. Create a Network Access policy object with a quarantine rule to block the source IP when the security event is triggered against Server1
D. Create an IPS Fitter policy object for the SSH_Brute_Force security event with a Victim address of Server1 and a quarantine response to block the source IP
A System Administrator is preparing to manage an XGS appliance using the SiteProtactor System.
Which three management actions can be performed? (Choose three.)
A. Apply a snapshot
B. Restart the appliance
C. Configure Static Routes
D. Create a Firmware backup
E. Manage the Appliance SSL Certificate
F. Change the Flexible Performance Level
A Security Administrator wants to enable a block page to alert users when they attempt to access HTTP websites that are blocked due to a Network Access Policy (NAP) rule.
How should the Administrator achieve this?
A. Add a NAP rule with an action of Drop
B. Add a NAP rule with an action of Reject
C. Add a NAP rule that has an action of Do Not Inspect and then set the response object to Block Page
D. Add a NAP rule with an action of Reject (Authenticate) and then create a special user group that has a default action of Block HTTP
The System Administrator has discovered the XGS device is overloaded and is dropping legitimate traffic.
Which setting is likely responsible for this behavior?
A. Unanalyzed policy configuration
B. TCP resets – TCP reset interface
C. Fail Closed hardware bypass mode
D. LogDB response enabled on NAP rules
A System Administrator notices a large amount of bandwidth being used by one of the web application servers on an unexpected destination port.
Which method can the System Administrator use to review a sample of that traffic?
A. Add an event filter for the IP address in question and assign it a packet capture response
B. Start a capture after adding filters specifying the source IP address and destination port
C. Use the tcpdump command to generate a capture and specify the src host and dst port values
D. Create an NAP rule specifying the source host address, web application, and a capture response
A Security Administrator wants to block access to streaming video on a news website.
Which object should be used and how should it be configured?
A. Use an IP Reputation object with the streaming video option enabled
B. Use a URL Category object with the News / Magazine category enabled
C. Use a Web application object with the stream/download action for the website
D. Use a URL Category object with the News / Magazine category enabled and a Non-Web application with video streaming protocols
The System Administrator of a banking organization has become aware of some malicious traffic to its IBM Security Network Protection (XGS) appliance. The logs show patterns of Denial of Service (DoS) attack and a lot of encrypted packets targeted to the M. 1 port of the XGS appliance coming from an internal laptop IP address.
What should the System Administrator do next?
A. Configure Management access policy to restrict access
B. Configure Inbound SSL policy to inspect and drop such traffic
C. Configure Management access policy to set the management port as TCP reset port
D. Configure Network access policy and Intrusion Prevention Policy to block DoS attacks