Labour Day Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

Trend Micro Certified Professional for Deep Security Exam Question and Answers

Trend Micro Certified Professional for Deep Security Exam

Last Update May 2, 2024
Total Questions : 80

We are offering FREE Deep-Security-Professional Trend Micro exam questions. All you do is to just go and sign up. Give your details, prepare Deep-Security-Professional free exam questions and then go for complete pool of Trend Micro Certified Professional for Deep Security Exam test questions that will help you more.

Deep-Security-Professional pdf

Deep-Security-Professional PDF

$35  $99.99
Deep-Security-Professional Engine

Deep-Security-Professional Testing Engine

$42  $119.99
Deep-Security-Professional PDF + Engine

Deep-Security-Professional PDF + Testing Engine

$56  $159.99
Questions 1

Which Deep Security Protection Modules can be used to provide runtime protection for the Kubernetes and Docker platforms? Select all that apply.

Options:

A.  

Intrusion Prevention

B.  

Log Inspection

C.  

Integrity Monitoring

D.  

Anti-Malware

Discussion 0
Questions 2

What is the effect of the Firewall rule displayed in the following exhibit?

Options:

A.  

This rule will allow incoming TCP and UPD communication to this server.

B.  

This rule will allow outgoing TCP and UPD communication from this server.

C.  

This rule will allow TCP and UPD replies to requests originating on this server.

D.  

This rule will allow incoming communication to this server, but not TCP and UP

D.  

Discussion 0
Questions 3

Policies in Deep Security can include a Context value. Which of the following statements re-garding Context is correct?

Options:

A.  

The Context provides Deep Security Agents with location awareness and are associated with Anti-Malware and Web Reputation Rules.

B.  

The Context provides Deep Security Agents with location awareness and are associated with Firewall and Intrusion Prevention Rules.

C.  

The Context provides Deep Security Agents with location awareness and are associated with Web Reputation Rules only.

D.  

The Context provides Deep Security Agents with location awareness and are associated with Log Inspection and Integrity Monitoring Rules.

Discussion 0
Questions 4

Which of the following VMware components is not required to enable agentless protection using Deep Security.

Options:

A.  

VMware NSX

B.  

VMware ESXi

C.  

VMware vRealize

D.  

VMware vCenter

Discussion 0
Questions 5

The details for an event are displayed in the exhibit. Based on these details, which Protection Module generated the event?

Options:

A.  

Firewall

B.  

Intrusion Prevention

C.  

Log Inspection

D.  

Integrity Monitoring

Discussion 0
Questions 6

A Recommendation Scan is run to determine which Intrusion Prevention rules are appropriate for a Server. The scan is configured to apply the suggested rules automatically and ongoing scans are enabled. Some time later, an operating system patch is applied. How can you de-termine which Intrusion Prevention rules are no longer needed on this Server?

Options:

A.  

The READ ME file provided with the software patch will indicate which issues were addressed with this release. Compare this list to the rules that are applied to determine which rules are no longer needed and can be disabled.

B.  

Since the rules are being applied automatically, when the next Intrusion Prevention Recommendation Scan is run automatically, any rules that are no longer needed will be automatically unassigned. These are rules that are no longer needed as the vulnerability was corrected with the patch.

C.  

Since there is no performance effect when multiple Intrusion Prevention rules are ap-plied, there is no need to determine which rules are no longer needed. The original rec-ommended rules can remain in place without affecting the system.

D.  

Since the rules are being applied automatically, when the next Intrusion Prevention Recommendation Scan is run automatically, any rules that are no longer needed will be displayed on the Recommended for Unassignment tab in the IPS Rules. These are rules that are no longer needed and can be disabled as the vulnerability was corrected with the patch.

Discussion 0
Questions 7

What is the role of Apex Central in the Connected Threat Defense infrastructure?

Options:

A.  

Apex Central distributes Deep Security policies to Agents on the protected Servers.

B.  

Apex Central submits suspicious files to Deep Discovery Analyzer for further analysis.

C.  

Apex Central stores suspicious files that are awaiting submission to the Deep Discovery Analyzer.

D.  

Apex Central compiles the Suspicious Objects List based on the result of file analysis in Deep Discovery Analyzer.

Discussion 0
Questions 8

Which of the following statements is false regarding Firewall rules using the Bypass action?

Options:

A.  

Applying a Firewall rule using the Bypass action to traffic in one direction automatically applies the same action to traffic in the other direction.

B.  

Firewall rules using the Bypass action do not generate log events.

C.  

Firewall rules using the Bypass action allow incoming traffic to skip both Firewall and Intrusion Prevention analysis.

D.  

Firewall rules using the Bypass action can be optimized, allowing traffic to flow as effi-ciently as if a Deep Security Agent was not there.

Discussion 0
Questions 9

Which of the following operations makes use of the Intrusion Prevention Protection Module?

Options:

A.  

Integrity scans

B.  

Port scans

C.  

Application traffic control

D.  

Stateful traffic analysis

Discussion 0
Questions 10

The Security Level for Web Reputation in a policy is set to High. A server assigned this policy attempts to access a Web site with a credibility score of 78.

What is the result?

Options:

A.  

The Deep Security Agent allows access to the Web site, and logs the connection attempt as an Event.

B.  

The Deep Security Agent allows access as the credibility score for the Web site is above the allowed threshold.

C.  

The Deep Security Agent blocks access as the credibility score for the Web site is below the allowed threshold. An error page is displayed in the Web browser.

D.  

The Deep Security Agent displays a warning message as the site is unrated.

Discussion 0
Questions 11

How does Smart Scan vary from conventional pattern-based anti-malware scanning?

Options:

A.  

Smart Scan improves the capture rate for malware scanning by sending features of suspicious files to an cloud-based server where the features are compared to known malware samples.

B.  

Smart Scan shifts much of the malware scanning functionality to an external Smart Protection Server.

C.  

Smart Scan is performed in real time, where conventional scanning must be triggered manually, or run on a schedule.

D.  

Smart Scan identifies files to be scanned based on the content of the file, not the exten-sion.

Discussion 0
Questions 12

Which of the following statements regarding the Integrity Monitoring Protection Module is true?

Options:

A.  

The Integrity Monitoring rules include a property that identifies whether a change to a monitored system object was performed as part of a legitimate operation.

B.  

Any changes to monitored system objects that are detected after a Recommendation Scan is run on the protected computer are assumed to be malicious.

C.  

The Integrity Monitoring Protection Module can detect changes to the system, but lacks the ability to distinguish between legitimate and malicious changes.

D.  

Any changes to the system objects monitored by the Integrity Monitoring Protection Module are assumed to be legitimate, however, an administrator can revise the status of the object modification to Malicious during a review of the Integrity Monitoring Events.

Discussion 0