Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Trend Micro Deep Security Deep-Security-Professional Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam Deep-Security-Professional Premium Access

View all detail and faqs for the Deep-Security-Professional exam


416 Students Passed

89% Average Score

96% Same Questions
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which Protection Modules can make use of a locally installed Smart Protection Server?

Options:

A.

The Anti-Malware and Web Reputation Protection Modules can make use of the locally installed Smart Protection Server.

B.

All Protection Modules can make use of the locally installed Smart Protection Server

C.

Anti-Malware is the only Protection Modules that can use the locally installed Smart Protection Server.

D.

The Anti-Malware, Web Reputation and Intrusion Prevention Protection Modules can make use of the locally installed Smart Protection Server.

Questions # 2:

Which of the following statements is true regarding Event Tagging?

Options:

A.

Adding a tag to an Event modifies the Event data by adding fields, including the name of the tag, the date the tag was applied, and whether the tag was applied manually or automatically

B.

Only a single tag can be assigned to an Event.

C.

Events can be tagged automatically if they are similar to known good Events.

D.

Events can be automatically deleted based on tags.

Questions # 3:

Based on the configuration setting highlighted in the exhibit, what behavior can be expected during a malware scan?

Question # 3

Options:

A.

With the highlighted setting enabled, Deep Security Agents will scan files for known viruses and malware using patterns and any files deemed suspicious will be submitted to a configured Deep Discovery Analyzer for further analysis.

B.

With the highlighted setting enabled, Deep Security Agents will scan files for viruses and malware using supplementary aggressive detection pattern files.

C.

With the highlighted setting enabled, Deep Security Agents will scan files for unknown malware using Predictive Machine Learning.

D.

With the highlighted setting enabled, Deep Security Agents will scan files for known malware as well as newly encounted malware by accessing the Suspicious Objects List.

Questions # 4:

What is the purpose of the Deep Security Relay?

Options:

A.

Deep Security Relays distribute load to the Deep Security Manager nodes in a high-availability implementation.

B.

Deep Security Relays forward policy details to Deep Security Agents and Virtual Appliances immediately after changes to the policy are applied.

C.

Deep Security Relays maintain the caches of policies applied to Deep Security Agents on protected computers to improve performance.

D.

Deep Security Relays are responsible for retrieving security and software updates and distributing them to Deep Security Manager, Agents and Virtual Appliances.

Questions # 5:

Where does Deep Security Manager store the credentials it uses to access the database?

Options:

A.

In the logging.properties file

B.

In the dsm.properties file

C.

In the Windows Registry

D.

In the database.properties file

Questions # 6:

What is the result of performing a Reset operation on a Deep Security Agent?

Options:

A.

A Reset operation generates Event information that can be used to troubleshoot Agent-to -Manager communication issues.

B.

A Reset operation forces an update to the Deep Security Agent software installed on a managed computer.

C.

A Reset operation forces the Deep Security Agent service to restart on the managed computer.

D.

A Reset operation wipes out any Deep Security Agent settings, including its relationship with Deep Security Manager.

Questions # 7:

Which of the following VMware components is not required to enable agentless protection using Deep Security.

Options:

A.

VMware NSX

B.

VMware ESXi

C.

VMware vRealize

D.

VMware vCenter

Questions # 8:

Which of the following statements is false regarding the Log Inspection Protection Module?

Options:

A.

Custom Log Inspections rules can be created using the Open Source Security (OSSEC) standard.

B.

Deep Security Manager collects Log Inspection Events from Deep Security Agents at every heartbeat.

C.

The Log Inspection Protection Module is supported in both agent-based and agentless environments.

D.

Scan for Recommendations identifies Log Inspection rules that Deep Security should implement.

Questions # 9:

Which of the following are valid methods for forwarding Event information from Deep Secu-rity? Select all that apply.

Options:

A.

Simple Network Management Protocol (SNMP)

B.

Deep Security Application Programming Interface (API)

C.

Amazon Simple Notification Service (SNS)

D.

Security Information and Event Management (SIEM)

Questions # 10:

Which of the following are valid methods for pre-approving software updates to prevent Ap-plication Control Events from being triggered by the execution of the modified software? Select all that apply.

Options:

A.

Once the inventory scan has run when Application Control is first enabled, there is no way to update the inventory to incorporate modified software.

B.

Software updates performed by a Trusted Updater will be automatically approved.

C.

Edit the inventory database file (AC.db) on the Agent computer to include the hash of the newly updated software. Save the change and restart the Deep Security Agent. The software updates will now be approved.

D.

Maintenance mode can be enabled while completing the updates.

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.