Trend Deep Security Professional Trend Micro Certified Professional for Deep Security Exam Online Training
Trend Deep Security Professional Online Training
The questions for Deep Security Professional were last updated at Dec 30,2024.
- Exam Code: Deep Security Professional
- Exam Name: Trend Micro Certified Professional for Deep Security Exam
- Certification Provider: Trend
- Latest update: Dec 30,2024
How does Smart Scan vary from conventional pattern-based anti-malware scanning?
- A . Smart Scan improves the capture rate for malware scanning by sending features of suspicious files to an cloud-based server where the features are compared to known malware samples.
- B . Smart Scan shifts much of the malware scanning functionality to an external Smart Protection Server.
- C . Smart Scan is performed in real time, where conventional scanning must be triggered manually, or run on a schedule.
- D . Smart Scan identifies files to be scanned based on the content of the file, not the exten-sion.
The Intrusion Prevention Protection Module is enabled and a Recommendation Scan is run to identify vulnerabilities on a Windows Server 2016 computer.
How can you insure that the list of recommendations is always kept up to date?
- A . Disabling, then re-enabling the Intrusion Prevention Protection Module will trigger a new Recommendation Scan to be run. New rules will be included in the results of this new scan.
- B . Recommendation Scans are only able to suggest Intrusion Prevention rules when the Protection Module is initially enabled.
- C . Enable "Ongoing Scans" to run a recommendation scan on a regular basis. This will identify new Intrusion Prevention rules to be applied.
- D . New rules are configured to be automatically sent to Deep Security Agents when Rec-ommendation Scans are run.
New servers are added to the Computers list in Deep Security Manager Web config by running a Discover operation.
What behavior can you expect for newly discovered computers?
- A . Any servers discovered in the selected Active Directory branch hosting a Deep Security Agent will be added to the Computers list.
- B . Any servers within the IP address range hosting a Deep Security Agent will be added to the Computers list.
- C . Any servers within the IP address range that are hosting Deep Security Agents will be added to the Computers list and will be automatically activated.
- D . Any servers within the IP address range will be added to the Computers list, regardless of whether they are hosting a Deep Security Agent or not.
Which of the following statements is true regarding Intrusion Prevention rules?
- A . Intrusion Prevention rules can block unrecognized software from executing.
- B . Intrusion Prevention rules check for the IP addresses of known malicious senders within a packet
- C . Intrusion Prevention rules can detect or block traffic associated with specific applications, such as Skype or file-sharing utilities.
- D . Intrusion Prevention rules monitor the system for changes to a baseline configuration.
The Firewall Protection Module is enabled on a server through the computer details.
What is default behavior of the Firewall if no rules are yet applied?
- A . All traffic is permitted through the firewall until either a Deny or Allow rule is assigned.
- B . A collection of default rules will automatically be assigned when the Firewall Protection Module is enabled.
- C . All traffic is blocked by the firewall until an Allow rule is assigned.
- D . All traffic is passed through the Firewall using a Bypass rule
What is the purpose of the Deep Security Notifier?
- A . The Deep Security Notifier is a application in the Windows System Tray that displays the Status of Deep Security Manager during policy and software updates.
- B . The Deep Security Notifier is a server components that collects log entries from man-aged computers for delivery to a configured SIEM device.
- C . The Deep Security Notifier is a server component used in agentless configurations to allow Deep Security Manager to notify managed computers of pending updates.
- D . The Deep Security Notifier is a application in the Windows System Tray that com-municates the state of Deep Security Agents and Relays to endpoint computers.
Which of the following statements is FALSE regarding Firewall rules using the Bypass action?
- A . Applying a Firewall rule using the Bypass action to traffic in one direction automatically applies the same action to traffic in the other direction.
- B . Firewall rules using the Bypass action do not generate log events.
- C . Firewall rules using the Bypass action allow incoming traffic to skip both Firewall and Intrusion Prevention analysis.
- D . Firewall rules using the Bypass action can be optimized, allowing traffic to flow as effi-ciently as if a Deep Security Agent was not there.
Your organization stores PDF and Microsoft Office files within the SAP Netweaver platform and requires these documents to be scanned for malware.
Which Deep Security component is required to satisfy this requirement?
- A . The Netweaver plug-in must be installed on the Deep Security Agent.
- B . A Smart Protection Server must be installed and configured to service the SAP Netweaver platform
- C . No extra components are required, this can be done by enabling the AntiMalware Pro-tection Module on the SAP Netweaver server.
- D . Deep Security Scanner is required.
A Deep Security administrator wishes to monitor a Windows SQL Server database and be alerted of any critical events which may occur on that server.
How can this be achieved using Deep Security?
- A . The administrator could install a Deep Security Agent on the server hosting the Win-dows Server 2016 database and enable the Integrity Monitoring Protection Module. A rule can be assigned to monitor the Windows SQL Server for any modifications to the server, with Alerts enabled.
- B . The administrator could install a Deep Security Agent on the server hosting the Win-dows Server 2016 database and enable the Log Inspection Protection Module. A rule can be assigned to monitor the Windows SQL Server for any critical events, with Alerts enabled.
- C . The administrator could install a Deep Security Agent on the server hosting the Win-dows Server 2016 database and enable the Intrusion Prevention Protection Module. A Recommendation Scan can be run and any suggested rule can be assigned to monitor the Windows SQL Server for any vulnerabilities, with Alerts enabled.
- D . This can not be achieved using Deep Security. Instead, the administrator could set up log forwarding within Window SQL Server 2016 and the administrator could monitor the logs within the syslog device.
Which of the following statements is false regarding Firewall rules using the Bypass action?
- A . Applying a Firewall rule using the Bypass action to traffic in one direction automatically applies the same action to traffic in the other direction.
- B . Firewall rules using the Bypass action do not generate log events.
- C . Firewall rules using the Bypass action allow incoming traffic to skip both Firewall and Intrusion Prevention analysis.
- D . Firewall rules using the Bypass action can be optimized, allowing traffic to flow as effi-ciently as if a Deep Security Agent was not there.