Which three Response Objects can be configured in IBM SiteProtector 3.0? (Choose three.)
A. Email
B. Warning
C. Log Evidence
D. User Specified
E. Server Notification
F. Administrator Specified
What is the purpose of the host configuration option in the IBM SiteProtector Security Fusion Policy?
A. To define the IP addresses that Fusion license is used for
B. To define the multiple IP addresses that are assigned to single physical server
C. To define what IP addresses are assigned to what vulnerability agent (scanner)
D. To define what IP addresses are assigned to what network protection (IPS) agent
Which configuration file controls the size of the ADF file?
A. ec.policy
B. adf.policy
C. adf.properties
D. common.policy
Which tool is recommended for a customer, who wants to retain old event data from the system?
A. Event Archiver
B. Event Backup Tool
C. Security Event Archive Tool
D. SiteProtector Storage Server
Which two options are available when registering legacy components? (Choose two.)
A. Locally Register Agent
B. Manually Register Agent
C. Remotely Register Agent
D. Physically Register Agent
E. Automatically Register Agent
Which policy is used to the configure the amount of time events are kept?
A. Advanced Purge
B. Event Archive Settings
C. Data Retention Settings
D. Maximum Database Sites
Which two Windows groups can be added to the IBM SiteProtector System User Group? (Choose two.)
A. Local Groups
B. System Groups
C. Domain Groups
D. Custom Groups
E. Network Groups
What is a small site installation of all SiteProtector components on a single computer called?
A. Express install
B. Standard install
C. SQL Cluster install
D. Simple deployment
Which two modifications can the Impact Analysis component make to a security event that failed in IBM SiteProtector 3.0 Security Fusion Module? (Choose two.)
A. Block the event
B. Change the priority of the event to Low
C. Change the priority of the event to High
D. Increase the severity of the event to one level
E. Decrease the severity of the event to one level
Which two pieces of information must be used for the re-installation on the siteand (Choose two.)
A. Event Archiver Policy file
B. IP Address of the Primary Site
C. IP Address of the original database
D. Configuration files of the Primary Site
E. IP Address of the original Application Server