Black Friday Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the Trend Micro Deep Security Deep-Security-Professional Questions and answers with ValidTests

Exam Deep-Security-Professional All Questions
Exam Deep-Security-Professional Premium Access

View all detail and faqs for the Deep-Security-Professional exam

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

The details for an event are displayed in the exhibit. Based on these details, which Protection Module generated the event?

Question # 1

Options:

A.

Integrity Monitoring

B.

Firewall

C.

Web Reputation

D.

Intrusion Prevention

Expert Solution
Questions # 2:

Which of the following statements is true regarding Intrusion Prevention rules?

Options:

A.

Intrusion Prevention rules can block unrecognized software from executing.

B.

Intrusion Prevention rules check for the IP addresses of known malicious senders within a packet

C.

Intrusion Prevention rules can detect or block traffic associated with specific applica-tions, such as Skype or file-sharing utilities.

D.

Intrusion Prevention rules monitor the system for changes to a baseline configuration.

Expert Solution
Questions # 3:

In the policy displayed in the exhibit, the state of the Web Reputation Protection Module is set to "Inherited (On)", while the state for the other Protection Module is set to "On". Why is the Web Reputation Protection Module displayed differently than the other Protection Modules.

Question # 3

Options:

A.

In this example, the state for the Web Reputation Protection Module is inherited from the parent policy, while the other Protection Modules were turned on specifically in this child policy.

B.

The state for a Protection Module is always displayed as "Inherited (On)" until the module components are installed on the Deep Security Agent.

C.

In this example, the state for the Web Reputation Protection Module is inherited from the parent policy, while the other Protection Modules were turned on at the computer level.

D.

In this example, the state for the Web Reputation Protection Module is listed as "In-herited (On)" as it was inherited from the default setting in the Base Policy.

Expert Solution
Questions # 4:

Which of the following operations makes use of the Intrusion Prevention Protection Module?

Options:

A.

Integrity scans

B.

Port scans

C.

Application traffic control

D.

Stateful traffic analysis

Expert Solution
Questions # 5:

How does Smart Scan vary from conventional pattern-based anti-malware scanning?

Options:

A.

Smart Scan improves the capture rate for malware scanning by sending features of suspicious files to a cloud-based server where the features are compared to known malware samples.

B.

Smart Scan shifts much of the malware scanning functionality to an external Smart Protection Server.

C.

Smart Scan is performed in real time, where conventional scanning must be triggered manually, or run on a schedule.

D.

Smart Scan identifies files to be scanned based on the content of the file, not the extension.

Expert Solution
Questions # 6:

What is the result of performing a Reset operation on a Deep Security Agent?

Options:

A.

A Reset operation generates Event information that can be used to troubleshoot Agent-to -Manager communication issues.

B.

A Reset operation forces an update to the Deep Security Agent software installed on a managed computer.

C.

A Reset operation forces the Deep Security Agent service to restart on the managed computer.

D.

A Reset operation wipes out any Deep Security Agent settings, including its relationship with Deep Security Manager.

Expert Solution
Questions # 7:

Which of the following statements is true regarding the Intrusion Prevention Protection Module?

Options:

A.

The Intrusion Prevention Protection Module blocks or allows traffic based on header information within data packets.

B.

The Intrusion Prevention Protection Module analyzes the payload within incoming and outgoing data packets to identify content that can signal an attack.

C.

The Intrusion Prevention Protection Module can identify changes applied to protected objects, such as the Hosts file, or the Windows Registry.

D.

The Intrusion Prevention Protection Module can prevent applications from executing, allowing an organization to block unallowed software.

Expert Solution
Questions # 8:

Where does Deep Security Manager store the credentials it uses to access the database?

Options:

A.

In the logging.properties file

B.

In the dsm.properties file

C.

In the Windows Registry

D.

In the database.properties file

Expert Solution
Questions # 9:

Which of the following statements is true regarding Intrusion Prevention protection?

Options:

A.

Intrusion Prevention protection can drop malicious packets but cannot reset the connection.

B.

Intrusion Prevention protection only works in conjunction with the Anti-Malware Protection Module.

C.

Intrusion Prevention protection can only work on computers where a Deep Security Agent is installed; agentless protection is not supported.

D.

Intrusion Prevention protection can drop or reset a connection.

Expert Solution
Questions # 10:

Which of the following statements correctly describes Smart Folders?

Options:

A.

Smart Folders identify the folders that will be scanned when a Real-Time, Manual or Scheduled malware scan is run.

B.

Smart Folders are a collection of subfolders containing the policy settings that are ap-plied to child policies or directly to Computers.

C.

Smart Folders act as a saved search of computers which is executed each time the folder is clicked to display its contents.

D.

Smart Folders are the containers used to store the results of Recommendation Scans. Once a Recommendation Scan has completed, and administrator can click a Smart Folder and select which of the recommended rules to apply.

Expert Solution
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions