Labour Day Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Trend Micro Deep-Security-Professional Trend Micro Certified Professional for Deep Security Exam Exam Practice Test

Page: 1 / 8
Total 80 questions

Trend Micro Certified Professional for Deep Security Exam Questions and Answers

Question 1

Based on the Malware Scan Configuration displayed in the exhibit, which of the following statements is false.

Question # 1

Options:

A.

Any document files that display suspicious behavior will be submitted and executed in a sandbox environment on a Deep Discover Analyzer device.

B.

Deep Security Agents using this Malware Scan Configuration will not monitor for compromised Windows processes.

C.

Deep Security Agents will only be able to identify malware in files by using patterns downloaded from the Smart Protection Network.

D.

Internet access is required to properly enable the features identified in this configuration.

Question 2

What is the effect of the Firewall rule displayed in the following exhibit?

Question # 2

Options:

A.

This rule will allow incoming TCP and UPD communication to this server.

B.

This rule will allow outgoing TCP and UPD communication from this server.

C.

This rule will allow TCP and UPD replies to requests originating on this server.

D.

This rule will allow incoming communication to this server, but not TCP and UPD.

Question 3

Which of the following operations makes use of the Intrusion Prevention Protection Module?

Options:

A.

Integrity scans

B.

Port scans

C.

Application traffic control

D.

Stateful traffic analysis

Question 4

An administrator attempts to activate the Deep Security Agent installed on a server by typing the following command in the Command Prompt on the Deep Security Agent computer:

dsa_control -a dsm://server1.acme.com:4120

The Agent does not activate as expected. What is a valid reason for this issue?

Options:

A.

The incorrect port was used. The correct command would be: dsa_control -a dsm://server1.acme.com:4118

B.

Deep Security Agents can not be activated through the Command Prompt. They must be activated through the Deep Security Manager Web console or through a deployment script.

C.

The command listed can only executed from the Command Prompt on the Deep Security Manager computer.

D.

"Allow Agent-Initiated Activation" is currently not enabled in Deep Security Manager.

Question 5

The Overrides settings for a computer are displayed in the exhibit. Which of the following statements is true regarding the displayed configuration?

Question # 5

Options:

A.

The Web Reputation and Application Control Protection Modules have been assigned a different policy that the other Protection Modules and as a result, are displayed with overrides.

B.

The configuration for the Protection Modules is inherited from the policy assigned to this computer, except for the configuration of the Web Reputation and Application Control Protection Modules which have been set at the computer level.

C.

The Protection Modules identified as Inherited in the exhibit have not yet been config-ured. Only the Web Reputation and Application Control Protection Modules have been configured.

D.

The Protection Modules identified as Inherited in the exhibit have not yet been enabled. Only the Web Reputation and Application Control Protection Modules have been enabled at this point.

Question 6

The Intrusion Prevention Protection Module is enabled, but the traffic it is trying to analyze is encrypted through https. How is it possible for the Intrusion Prevention Protection Module to monitor this encrypted traffic against the assigned rules?

Options:

A.

It is possible to monitor the https traffic by creating an SSL Configuration. Creating a new SSL Configuration will make the key information needed to decrypt the traffic available to the Deep Security Agent.

B.

The Intrusion Prevention Protection Module is not able to analyze encrypted https traffic.

C.

The Intrusion Prevention Protection Module can only analyze https traffic originating from other servers hosting a Deep Security Agent.

D.

The Intrusion Prevention Protection Module can analyze https traffic if the public cer-tificate of the originating server is imported into the certificate store on the Deep Secu-rity Agent computer.

Question 7

Which of the following is not an operation that is performed when network traffic is intercepted by the network driver on the Deep Security Agent?

Options:

A.

Analyze the packet within the context of traffic history and connection state.

B.

Compare the data in the packet against the Anti-Malware Scan Configuration to verify whether any of the data related to files and folders on the Exclusion list.

C.

Verify the integrity of the packet to insure the packet is suitable for analysis.

D.

Verify the packet is not part of a reconnaissance scan used to discover weaknesses on the Deep Security Agent host computer.

Question 8

Which of the following statements is FALSE regarding Firewall rules using the Bypass action?

Options:

A.

Applying a Firewall rule using the Bypass action to traffic in one direction automatically applies the same action to traffic in the other direction.

B.

Firewall rules using the Bypass action do not generate log events.

C.

Firewall rules using the Bypass action allow incoming traffic to skip both Firewall and Intrusion Prevention analysis.

D.

Firewall rules using the Bypass action can be optimized, allowing traffic to flow as effi-ciently as if a Deep Security Agent was not there.

Question 9

While viewing the details of the Firewall Protection Module, as displayed in the exhibit, you note that a few rules have already been assigned. You try to disable these rules, but they can not be unassigned. Why can the displayed rules not be unassigned?

Question # 9

Options:

A.

The rules displayed in the exhibit have been hard-coded with the details of the policy. These rules will automatically be assigned to all Firewall policies that are created and can not be unassigned.

B.

The rules displayed in the exhibit have been assigned to the policy at the parent level. Rules assigned to a parent policy can not be unassigned at the child level.

C.

The rules displayed in the exhibit were assigned to the policy automatically when a Recommendation Scan was run. Rules assigned through a Recommendation Scan can not be disabled once assigned.

D.

The rules displayed in the exhibit can not be unassigned as the administrator currently logged into the Deep Security Manager Web console does not have the permissions necessary to unassign rules.

Question 10

Which of the following statements is true regarding Event Tagging?

Options:

A.

Adding a tag to an Event modifies the Event data by adding fields, including the name of the tag, the date the tag was applied, and whether the tag was applied manually or automatically

B.

Only a single tag can be assigned to an Event.

C.

Events can be tagged automatically if they are similar to known good Events.

D.

Events can be automatically deleted based on tags.

Question 11

Which of the following correctly describes the Firewall rule Action of Force Allow?

Options:

A.

Force Allow permits traffic that would otherwise be denied by other Firewall rules to pass, but still enforces filtering by the Intrusion Prevention Protection Module.

B.

Force Allow permits traffic to bypass analysis by both the Firewall and Intrusion Pre-vention Protection Modules.

C.

Force Allow explicitly allows traffic that matches the Firewall rule to pass, and implicitly denies all other traffic.

D.

Force Allow permits traffic to bypass analysis by all Deep Security Protection Modules.

Question 12

As the administrator in a multi-tenant environment, you would like to monitor the usage of security services by tenants? Which of the following are valid methods for monitoring the usage of the system by the tenants?

Options:

A.

Generate a Chargeback report in Deep Security manager Web console.

B.

All the choices listed here are valid.

C.

Use the Representational State Transfer (REST) API to collect usage data from the tenants.

D.

Monitor usage by the tenants from the Statistics tab in the tenant Properties window.

Page: 1 / 8
Total 80 questions