Weekend Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

Trend Micro Deep-Security-Professional Trend Micro Certified Professional for Deep Security Exam Exam Practice Test

Trend Micro Certified Professional for Deep Security Exam Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36.75  $104.99
Question 1

Your organization would like to implement a mechanism to alert administrators when files on a protected servers are modified or tampered with. Which Deep Security Protection Module should you enable to provide this functionality?

Options:

A.

The Integrity Monitoring Protection Module

B.

The File Inspection Protection Module

C.

Deep Security can not provide this type of functionality

D.

The Intrusion Prevention Protection Module

Question 2

What is the purpose of the override.properties file?

Options:

A.

This file is used to transfer policy settings from one installation of Deep Security Man-ager to another

B.

This file allows properties to be tested on Deep Security Manager without affecting the original configuration.

C.

This file contains the original out-of-the-box configuration properties for Deep Security Manager. This file is renamed to dsm.properties upon initialization of Deep Security Manager.

D.

This file allows Deep Security Agents to override enforced behavior by providing new policy configuration details.

Question 3

Which Protection Modules can make use of a locally installed Smart Protection Server?

Options:

A.

The Anti-Malware and Web Reputation Protection Modules can make use of the locally installed Smart Protection Server.

B.

All Protection Modules can make use of the locally installed Smart Protection Server

C.

Anti-Malware is the only Protection Modules that can use the locally installed Smart Protection Server.

D.

The Anti-Malware, Web Reputation and Intrusion Prevention Protection Modules can make use of the locally installed Smart Protection Server.

Question 4

Which of the following are valid methods for pre-approving software updates to prevent Ap-plication Control Events from being triggered by the execution of the modified software? Select all that apply.

Options:

A.

Once the inventory scan has run when Application Control is first enabled, there is no way to update the inventory to incorporate modified software.

B.

Software updates performed by a Trusted Updater will be automatically approved.

C.

Edit the inventory database file (AC.db) on the Agent computer to include the hash of the newly updated software. Save the change and restart the Deep Security Agent. The software updates will now be approved.

D.

Maintenance mode can be enabled while completing the updates.

Question 5

Which of the following statements is false regarding Firewall rules using the Bypass action?

Options:

A.

Applying a Firewall rule using the Bypass action to traffic in one direction automatically applies the same action to traffic in the other direction.

B.

Firewall rules using the Bypass action do not generate log events.

C.

Firewall rules using the Bypass action allow incoming traffic to skip both Firewall and Intrusion Prevention analysis.

D.

Firewall rules using the Bypass action can be optimized, allowing traffic to flow as effi-ciently as if a Deep Security Agent was not there.

Question 6

What is the result of performing a Reset operation on a Deep Security Agent?

Options:

A.

A Reset operation generates Event information that can be used to troubleshoot Agent-to -Manager communication issues.

B.

A Reset operation forces an update to the Deep Security Agent software installed on a managed computer.

C.

A Reset operation forces the Deep Security Agent service to restart on the managed computer.

D.

A Reset operation wipes out any Deep Security Agent settings, including its relationship with Deep Security Manager.

Question 7

An administrator attempts to activate the Deep Security Agent installed on a server by typing the following command in the Command Prompt on the Deep Security Agent computer:

dsa_control -a dsm://server1.acme.com:4120

The Agent does not activate as expected. What is a valid reason for this issue?

Options:

A.

The incorrect port was used. The correct command would be: dsa_control -a dsm://server1.acme.com:4118

B.

Deep Security Agents can not be activated through the Command Prompt. They must be activated through the Deep Security Manager Web console or through a deployment script.

C.

The command listed can only executed from the Command Prompt on the Deep Security Manager computer.

D.

"Allow Agent-Initiated Activation" is currently not enabled in Deep Security Manager.

Question 8

Which of the following statements is true regarding Deep Security Relays?

Options:

A.

Both 32-bit and 64-bit Deep Security Agents can be promoted to a Deep Security Relay.

B.

Deep Security Agents promoted to Deep Security Relays no longer provide the security capabilities enabled by the Protection Modules.

C.

Deep Security Relays are able to process Deep Security Agent requests during updates.

D.

Deep Security Agents communicate with Deep Security Relays to obtain security up-dates.

Question 9

Based on the policy configuration displayed in the exhibit, which of the following statements is true?

Options:

A.

Changes to any of the Deep Security policies will be send to the Deep Security Agents as soon as the changes are saved.

B.

Administrators with access to the protected Server will be able to uninstall the Deep Security Agent through Windows Control Panel.

C.

Deep Security Agents will send event information to Deep Security Manager every 10 minutes.

D.

If the Deep Security Manager does not receive a message from the Deep Security agent every 20 minutes, an alert will be raised.

Question 10

How can you prevent a file from being scanned for malware?

Options:

A.

Enable "File Types scanned by IntelliScan" in the Malware Scan Configuration prop-erties in the Deep Security Manager Web console. Click "Scan All Except" and type the filename to exclude from the scan.

B.

Edit the "Scan Exclusions" section of the dsa.properties configuration file on the Deep Security Agent computer to include the file name. Save the configuration file and restart the Deep Security Agent service.

C.

Add the file to the Exclusions list in the Malware Scan Configuration.

D.

Add the file to the Exclusions list in the "Allowed Spyware/Grayware Configuration".

Question 11

Which of the following correctly describes the Firewall rule Action of Force Allow?

Options:

A.

Force Allow permits traffic that would otherwise be denied by other Firewall rules to pass, but still enforces filtering by the Intrusion Prevention Protection Module.

B.

Force Allow permits traffic to bypass analysis by both the Firewall and Intrusion Pre-vention Protection Modules.

C.

Force Allow explicitly allows traffic that matches the Firewall rule to pass, and implicitly denies all other traffic.

D.

Force Allow permits traffic to bypass analysis by all Deep Security Protection Modules.

Question 12

What is the role of Apex Central in the Connected Threat Defense infrastructure?

Options:

A.

Apex Central distributes Deep Security policies to Agents on the protected Servers.

B.

Apex Central submits suspicious files to Deep Discovery Analyzer for further analysis.

C.

Apex Central stores suspicious files that are awaiting submission to the Deep Discovery Analyzer.

D.

Apex Central compiles the Suspicious Objects List based on the result of file analysis in Deep Discovery Analyzer.