Summer Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

Deep-Security-Professional Sample Questions Answers

Questions 4

Based on the script displayed in the exhibit, which of the following statements are correct? Select all that apply.

Options:

A.

Deep Security Agents deployed using this script will be activated against Tenant 0 in a multi-tenant environment.

B.

This script will deploy the Deep Security Agent on a server, but will not automatically activate it.

C.

Deep Security Agents deployed using this script are activated against a specific tenant.

D.

Deep Security Agents deployed using this script will be assigned a specific policy when activated.

Buy Now
Questions 5

Which of the following statements is true regarding Deep Security Manager-todatabase com-munication?

Options:

A.

Deep Security Manager-to-database traffic is not encrypted by default, but can be en-abled by modifying settings in the ssl.properties file.

B.

Deep Security Manager-to-database traffic is encrypted by default, but can be disabled by modifying settings in the dsm.properties file.

C.

Deep Security Manager-to-database traffic is encrypted by default but can be disabled by modifying settings in the db.properties file.

D.

Deep Security Manager-to-database traffic is not encrypted by default, but can be en-abled by modifying settings in the dsm.properties file.

Buy Now
Questions 6

Which of the following operations makes use of the Intrusion Prevention Protection Module?

Options:

A.

Integrity scans

B.

Port scans

C.

Application traffic control

D.

Stateful traffic analysis

Buy Now
Questions 7

The Intrusion Prevention Protection Module is enabled and a Recommendation Scan is run to identify vulnerabilities on a Windows Server 2016 computer. How can you insure that the list of recommendations is always kept up to date?

Options:

A.

Disabling, then re-enabling the Intrusion Prevention Protection Module will trigger a new Recommendation Scan to be run. New rules will be included in the results of this new scan.

B.

Recommendation Scans are only able to suggest Intrusion Prevention rules when the Protection Module is initially enabled.

C.

Enable "Ongoing Scans" to run a recommendation scan on a regular basis. This will identify new Intrusion Prevention rules to be applied.

D.

New rules are configured to be automatically sent to Deep Security Agents when Rec-ommendation Scans are run.

Buy Now
Questions 8

When viewing the details for a policy, as displayed in the exhibit, you notice that the Application Control Protection Module is not available. In this example, why would this Protection Modules not be available?

Options:

A.

The Application Control Protection Module has been disabled at the Base Policy level and is not displayed in the details for child policies.

B.

The Application Control Protection Module is only supported on Linux computers, the policy details displayed are for Windows computers only.

C.

An Activation Code for the Application Control Protection Module has not been pro-vided. Unlicensed Protection Modules will not be displayed.

D.

The Application Control Protection Modules has not been enabled for this tenant.

Buy Now
Questions 9

An administrator enables Multi-Tenancy in Deep Security and creates multiple tenants. After a period of time, the administrator would like to review the usage and resource consumption by a specific tenant. How can the administrator retrieve this information?

Options:

A.

The administrator could check the Multi-Tenancy log file for resource consumption details.

B.

The administrator could generate a Tenant report from within the Deep Security Manager Web console.

C.

The administrator will not be able retrieve this information without licensing and ena-bling the Multi-Tenancy Chargeback module in the Deep Security Manager Web con-sole.

D.

The administrator downloads the Tenant usage details from the Deep Security Agent on the Tenant computer.

Buy Now
Questions 10

Which of the following statements regarding the Integrity Monitoring Protection Module is true?

Options:

A.

The Integrity Monitoring rules include a property that identifies whether a change to a monitored system object was performed as part of a legitimate operation.

B.

Any changes to monitored system objects that are detected after a Recommendation Scan is run on the protected computer are assumed to be malicious.

C.

The Integrity Monitoring Protection Module can detect changes to the system, but lacks the ability to distinguish between legitimate and malicious changes.

D.

Any changes to the system objects monitored by the Integrity Monitoring Protection Module are assumed to be legitimate, however, an administrator can revise the status of the object modification to Malicious during a review of the Integrity Monitoring Events.

Buy Now
Questions 11

Which of the following statements is FALSE regarding Firewall rules using the Bypass action?

Options:

A.

Applying a Firewall rule using the Bypass action to traffic in one direction automatically applies the same action to traffic in the other direction.

B.

Firewall rules using the Bypass action do not generate log events.

C.

Firewall rules using the Bypass action allow incoming traffic to skip both Firewall and Intrusion Prevention analysis.

D.

Firewall rules using the Bypass action can be optimized, allowing traffic to flow as effi-ciently as if a Deep Security Agent was not there.

Buy Now
Questions 12

Which of the following are valid methods for forwarding Event information from Deep Secu-rity? Select all that apply.

Options:

A.

Simple Network Management Protocol (SNMP)

B.

Deep Security Application Programming Interface (API)

C.

Amazon Simple Notification Service (SNS)

D.

Security Information and Event Management (SIEM)

Buy Now
Questions 13

Based on the configuration setting highlighted in the exhibit, what behavior can be expected during a malware scan?

Options:

A.

With the highlighted setting enabled, Deep Security Agents will scan files for known viruses and malware using patterns and any files deemed suspicious will be submitted to a configured Deep Discovery Analyzer for further analysis.

B.

With the highlighted setting enabled, Deep Security Agents will scan files for viruses and malware using supplementary aggressive detection pattern files.

C.

With the highlighted setting enabled, Deep Security Agents will scan files for unknown malware using Predictive Machine Learning.

D.

With the highlighted setting enabled, Deep Security Agents will scan files for known malware as well as newly encounted malware by accessing the Suspicious Objects List.

Buy Now
Questions 14

Which of the following statements is true regarding Firewall Rules?

Options:

A.

Firewall Rules applied to Policy supersede similar rules applied to individuals computers.

B.

When traffic is intercepted by the network filter, Firewall Rules in the policy are always applied before any other processing is done.

C.

Firewall Rules applied through a parent-level Policy cannot be unassigned in a child-level policy.

D.

Firewall Rules are always processed in the order in which they appear in the rule list, as displayed in the Deep Security manager Web console.

Buy Now
Questions 15

Which of the following statements is true regarding the use of the Firewall Protection Module in Deep Security?

Options:

A.

The Firewall Protection Module can check files for certain characteristics such as compression and known exploit code.

B.

The Firewall Protection Module can identify suspicious byte sequences in packets.

C.

The Firewall Protection Module can detect and block Cross Site Scripting and SQL In-jection attacks.

D.

The Firewall Protection Module can prevent DoS attacks coming from multiple systems.

Buy Now
Questions 16

Which of the following statements correctly describes Smart Folders?

Options:

A.

Smart Folders identify the folders that will be scanned when a Real-Time, Manual or Scheduled malware scan is run.

B.

Smart Folders are a collection of subfolders containing the policy settings that are ap-plied to child policies or directly to Computers.

C.

Smart Folders act as a saved search of computers which is executed each time the folder is clicked to display its contents.

D.

Smart Folders are the containers used to store the results of Recommendation Scans. Once a Recommendation Scan has completed, and administrator can click a Smart Folder and select which of the recommended rules to apply.

Buy Now
Questions 17

Which Protection Modules can make use of a locally installed Smart Protection Server?

Options:

A.

The Anti-Malware and Web Reputation Protection Modules can make use of the locally installed Smart Protection Server.

B.

All Protection Modules can make use of the locally installed Smart Protection Server

C.

Anti-Malware is the only Protection Modules that can use the locally installed Smart Protection Server.

D.

The Anti-Malware, Web Reputation and Intrusion Prevention Protection Modules can make use of the locally installed Smart Protection Server.

Buy Now
Questions 18

Which of the following file types would not be evaluated by the Application Control Protection Module?

Options:

A.

.py scripts

B.

.exe files

C.

.class files

D.

.docx files

Buy Now
Questions 19

Based on the Malware Scan Configuration displayed in the exhibit, which of the following statements is false.

Options:

A.

Any document files that display suspicious behavior will be submitted and executed in a sandbox environment on a Deep Discover Analyzer device.

B.

Deep Security Agents using this Malware Scan Configuration will not monitor for compromised Windows processes.

C.

Deep Security Agents will only be able to identify malware in files by using patterns downloaded from the Smart Protection Network.

D.

Internet access is required to properly enable the features identified in this configuration.

Buy Now
Questions 20

Which of the following statements is correct regarding the policy settings displayed in the exihibit?

Options:

A.

The Heartbeat interval value displayed in this policy is inherited from the parent policy

B.

Deep Security Agents using the displayed policy will send event details to Deep Security Manager every 5 minutes.

C.

All Deep Security Agents will send event details to Deep Security Manager every 5 minutes.

D.

Deep Security Manager will refresh the policy details on the Deep Security Agents using this policy every 5 minutes.

Buy Now
Questions 21

Multiple Application Control Events are being displayed in Deep Security after a series of ap-plication updates and the administrator would like to reset Application Control. How can this be done?

Options:

A.

On the Deep Security Agent computer, type the following command to reset Application Control: dsa_control -r

B.

Click "Clear All" on the Actions tab in the Deep Security Manager Web console to reset the list of Application Control events.

C.

Application Control can be reset by disabling the Protection Module, then enabling it once again. This will cause local rulesets to be rebuilt.

D.

Application Control can not be reset.

Buy Now
Questions 22

How is caching used by the Web Reputation Protection Module?

Options:

A.

Caching is used by the Web Reputation Protection Module to temporarily store the credibility score for a Web site. The retrieved credibility score is cached in case the score for the Web site is required again for the life of the cache.

B.

Caching is used by the Web Reputation Protection Module to temporarily store the pages that make up the Web site. The Web site is cached in case the site is visited again for the life of the cache.

C.

Caching is used by the Web Reputation Protection Module to keep track of Web sites that are added to the Allowed list. Any sites added to the Allowed list will be accessible by protected servers regardless of their credibility score.

D.

Caching is used by the Web Reputation Protection Module to keep track of Allowed and Blocked Web sites. Any sites that are Allowed or Blocked do not require the retrieval of a credibility score from the Trend Micro Web Reputation Service.

Buy Now
Questions 23

What is IntelliScan?

Options:

A.

IntelliScan is a method of identifying which files are subject to malware scanning as determined from the file content. It uses the file header to verify the true file type.

B.

IntelliScan is a mechanism that improves scanning performance. It recognizes files that have already been scanned based on a digital fingerprint of the file.

C.

IntelliScan reduces the risk of viruses entering your network by blocking real-time compressed executable files and pairs them with other characteristics to improve mal-ware catch rates.

D.

IntelliScan is a malware scanning method that monitors process memory in real time. It can identify known malicious processes and terminate them.

Buy Now
Questions 24

The Security Level for Web Reputation in a policy is set to High. A server assigned this policy attempts to access a Web site with a credibility score of 78.

What is the result?

Options:

A.

The Deep Security Agent allows access to the Web site, and logs the connection attempt as an Event.

B.

The Deep Security Agent allows access as the credibility score for the Web site is above the allowed threshold.

C.

The Deep Security Agent blocks access as the credibility score for the Web site is below the allowed threshold. An error page is displayed in the Web browser.

D.

The Deep Security Agent displays a warning message as the site is unrated.

Buy Now
Exam Code: Deep-Security-Professional
Exam Name: Trend Micro Certified Professional for Deep Security Exam
Last Update: May 19, 2024
Questions: 80
$64  $159.99
$48  $119.99
$40  $99.99
buy now Deep-Security-Professional