Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Deep-Security-Professional Exam Dumps - Trend Micro Certified Professional for Deep Security Exam

Question # 4

The Overrides settings for a computer are displayed in the exhibit. Which of the following statements is true regarding the displayed configuration?

A.

The Web Reputation and Application Control Protection Modules have been assigned a different policy that the other Protection Modules and as a result, are displayed with overrides.

B.

The configuration for the Protection Modules is inherited from the policy assigned to this computer, except for the configuration of the Web Reputation and Application Control Protection Modules which have been set at the computer level.

C.

The Protection Modules identified as Inherited in the exhibit have not yet been config-ured. Only the Web Reputation and Application Control Protection Modules have been configured.

D.

The Protection Modules identified as Inherited in the exhibit have not yet been enabled. Only the Web Reputation and Application Control Protection Modules have been enabled at this point.

Full Access
Question # 5

The Intrusion Prevention Protection Module is enabled, but the traffic it is trying to analyze is encrypted through https. How is it possible for the Intrusion Prevention Protection Module to monitor this encrypted traffic against the assigned rules?

A.

It is possible to monitor the https traffic by creating an SSL Configuration. Creating a new SSL Configuration will make the key information needed to decrypt the traffic available to the Deep Security Agent.

B.

The Intrusion Prevention Protection Module is not able to analyze encrypted https traffic.

C.

The Intrusion Prevention Protection Module can only analyze https traffic originating from other servers hosting a Deep Security Agent.

D.

The Intrusion Prevention Protection Module can analyze https traffic if the public cer-tificate of the originating server is imported into the certificate store on the Deep Secu-rity Agent computer.

Full Access
Question # 6

Which Deep Security Protection Modules can be used to provide runtime protection for the Kubernetes and Docker platforms? Select all that apply.

A.

Intrusion Prevention

B.

Log Inspection

C.

Integrity Monitoring

D.

Anti-Malware

Full Access
Question # 7

How is caching used by the Web Reputation Protection Module?

A.

Caching is used by the Web Reputation Protection Module to temporarily store the credibility score for a Web site. The retrieved credibility score is cached in case the score for the Web site is required again for the life of the cache.

B.

Caching is used by the Web Reputation Protection Module to temporarily store the pages that make up the Web site. The Web site is cached in case the site is visited again for the life of the cache.

C.

Caching is used by the Web Reputation Protection Module to keep track of Web sites that are added to the Allowed list. Any sites added to the Allowed list will be accessible by protected servers regardless of their credibility score.

D.

Caching is used by the Web Reputation Protection Module to keep track of Allowed and Blocked Web sites. Any sites that are Allowed or Blocked do not require the retrieval of a credibility score from the Trend Micro Web Reputation Service.

Full Access
Question # 8

The Intrusion Prevention Protection Module is enabled, its Behavior is set to Prevent and rules are assigned. When viewing the events, you notice that one of Intrusion Prevention rules is being triggered and an event is being logged but the traffic is not being blocked. What is a possible reason for this?

A.

The Deep Security Agent is experiencing a system problem and is not processing packets since the "Network Engine System Failure" mode is set to "Fail Open".

B.

The network engine is running in Inline mode. In Inline mode, Deep Security provides no protection beyond a record of events.

C.

The Intrusion Prevention rule is being triggered as a result of the packet sanity check failing and the packet is being allowed to pass.

D.

The default Prevention Behavior in this particular rule may be set to Detect. This logs the triggering of the rule, but does not actually enforce the block.

Full Access
Question # 9

New servers are added to the Computers list in Deep Security Manager Web config by running a Discover operation. What behavior can you expect for newly discovered computers?

A.

Any servers discovered in the selected Active Directory branch hosting a Deep Security Agent will be added to the Computers list.

B.

Any servers within the IP address range hosting a Deep Security Agent will be added to the Computers list.

C.

Any servers within the IP address range that are hosting Deep Security Agents will be added to the Computers list and will be automatically activated.

D.

Any servers within the IP address range will be added to the Computers list, regardless of whether they are hosting a Deep Security Agent or not.

Full Access
Question # 10

Which of the following statements is true regarding the Log Inspection Protection Module?

A.

Deep Security Agents forward Log Inspection Event details to Deep Security Manager in real time.

B.

Log Inspection can only examine new Events and cannot examine logs entries created before the Protection Module was enabled.

C.

Log Inspection can only examine Deep Security log information.

D.

The Log Inspection Protection Module is supported in both Agent-based and Agentless implementations.

Full Access
Question # 11

What is the purpose of the Deep Security Relay?

A.

Deep Security Relays distribute load to the Deep Security Manager nodes in a high-availability implementation.

B.

Deep Security Relays forward policy details to Deep Security Agents and Virtual Ap-pliances immediately after changes to the policy are applied.

C.

Deep Security Relays maintain the caches of policies applied to Deep Security Agents on protected computers to improve performance.

D.

Deep Security Relays are responsible for retrieving security and software updates and distributing them to Deep Security Manager, Agents and Virtual Appliances.

Full Access
Question # 12

What is IntelliScan?

A.

IntelliScan is a method of identifying which files are subject to malware scanning as determined from the file content. It uses the file header to verify the true file type.

B.

IntelliScan is a mechanism that improves scanning performance. It recognizes files that have already been scanned based on a digital fingerprint of the file.

C.

IntelliScan reduces the risk of viruses entering your network by blocking real-time compressed executable files and pairs them with other characteristics to improve mal-ware catch rates.

D.

IntelliScan is a malware scanning method that monitors process memory in real time. It can identify known malicious processes and terminate them.

Full Access