RSA Archer Certified Administrator 5.x Exam
RSA Certified SE Professional in Data Loss Prevention Exam
RSA Certified SE Professional in Governance - Risk and Compliance
RSA SecurID Certified Administrator 8.0 Exam
RSA Archer Associate Exam6201
RSA NetWitness Logs & Network Analyst
RSA Identity Governance and Lifecycle Professional Exam
RSA SecurID Access Associate Exam
RSA SecurID Access Professional Exam
RSA NetWitness Endpoint Administrator Exam
When storage on the core devices fills to capacity, what happens?
new traffic cannot be ingested
the decoder leverages capacity in the concentrator, and collection continues
the decoder leverages capacity in the broker, and collection continues
the oldest stored sessions are deleted and collection continues
To create meta keys that will appear in the Investigation view, you would most commonly edit configuration files on the
Packet Decoder
Concentrator
Broker
Log Decoder
Which of the following statements is true regarding Packet-based analysis in general?
Packet-based analysis is required for viewing log and session data
Packet-based analysis is based on metadata capture reduced to packets
Packet-based analysis can be accomplished with common tools such as Wireshark
Packet-based analysis is accomplished using the table-map xml file