Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Trend Micro Certified Professional for Deep Security Exam

Last Update 21 hours ago Total Questions : 73

The Trend Micro Certified Professional for Deep Security Exam content is now fully updated, with all current exam questions added 21 hours ago. Deciding to include Deep-Security-Professional practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our Deep-Security-Professional exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these Deep-Security-Professional sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Trend Micro Certified Professional for Deep Security Exam practice test comfortably within the allotted time.

Question # 4

Your organization would like to implement a mechanism to alert administrators when files on a protected servers are modified or tampered with. Which Deep Security Protection Module should you enable to provide this functionality?

A.

The Integrity Monitoring Protection Module

B.

The File Inspection Protection Module

C.

Deep Security can not provide this type of functionality

D.

The Intrusion Prevention Protection Module

Question # 5

Which of the following statements is true regarding Deep Security Relays?

A.

Both 32-bit and 64-bit Deep Security Agents can be promoted to a Deep Security Relay.

B.

Deep Security Agents promoted to Deep Security Relays no longer provide the security capabilities enabled by the Protection Modules.

C.

Deep Security Relays are able to process Deep Security Agent requests during updates.

D.

Deep Security Agents communicate with Deep Security Relays to obtain security updates.

Question # 6

Recommendation scans can detect applications and/or vulnerabilities on servers on the network. Which of the following Protection Modules make use of Recommendation scans?

A.

Firewall, Application Control, and Integrity Monitoring

B.

Intrusion Prevention, Firewall, Integrity Monitoring and Log Inspection

C.

Log Inspection, Application Control, and Intrusion Prevention

D.

Intrusion Prevention, Integrity Monitoring, and Log Inspection

Question # 7

Based on the following exhibit, what behavior would you expect for the Application Control Protection Module?

A.

Since this computer is in Maintenance Mode, updates to the Application Control Protection Module will be applied.

B.

Since this computer is in Maintenance Mode, new or changed software will be automatically added to the list of Allowed software in the currently active ruleset.

C.

Since this computer is in Maintenance Mode, Application Control will allow any Blocked software to temporarily run.

D.

Since this computer is in Maintenance Mode, Application Control will ignore any Blocked software in the currently active ruleset.

Question # 8

Which of the following is not an operation that is performed when network traffic is intercepted by the network driver on the Deep Security Agent?

A.

Analyze the packet within the context of traffic history and connection state.

B.

Compare the data in the packet against the Anti-Malware Scan Configuration to verify whether any of the data related to files and folders on the Exclusion list.

C.

Verify the integrity of the packet to insure the packet is suitable for analysis.

D.

Verify the packet is not part of a reconnaissance scan used to discover weaknesses on the Deep Security Agent host computer.

Question # 9

How is scan caching used in agentless implementations of Deep Security?

A.

Scan caching maintains the Inclusions and Exclusions lists from the Malware Scan Configuration in memory to improve performance.

B.

Scan caching manages resource usage by staggering the launch of malware scans to prevent scan storms

C.

Scan caching is used in Agent-based installations only and is not supported in an agentless implementation.

D.

Scan caching enhances the performance of the Deep Security Virtual Appliance in that files scanned for malware on a virtual machine that appear on other virtual machines may not need to be scanned again.

Question # 10

As the administrator in a multi-tenant environment, you would like to monitor the usage of security services by tenants? Which of the following are valid methods for monitoring the usage of the system by the tenants?

A.

Generate a Chargeback report in Deep Security manager Web console.

B.

All the choices listed here are valid.

C.

Use the Representational State Transfer (REST) API to collect usage data from the tenants.

D.

Monitor usage by the tenants from the Statistics tab in the tenant Properties window.

Go to page: