Weekend Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Trend Micro Deep-Security-Professional Trend Micro Certified Professional for Deep Security Exam Exam Practice Test

Trend Micro Certified Professional for Deep Security Exam Questions and Answers

Question 1

Which of the following statements regarding the Integrity Monitoring Protection Module is true?

Options:

A.

The Integrity Monitoring rules include a property that identifies whether a change to a monitored system object was performed as part of a legitimate operation.

B.

Any changes to monitored system objects that are detected after a Recommendation Scan is run on the protected computer are assumed to be malicious.

C.

The Integrity Monitoring Protection Module can detect changes to the system, but lacks the ability to distinguish between legitimate and malicious changes.

D.

Any changes to the system objects monitored by the Integrity Monitoring Protection Module are assumed to be legitimate, however, an administrator can revise the status of the object modification to Malicious during a review of the Integrity Monitoring Events.

Question 2

What is the result of performing a Reset operation on a Deep Security Agent?

Options:

A.

A Reset operation generates Event information that can be used to troubleshoot Agent-to -Manager communication issues.

B.

A Reset operation forces an update to the Deep Security Agent software installed on a managed computer.

C.

A Reset operation forces the Deep Security Agent service to restart on the managed computer.

D.

A Reset operation wipes out any Deep Security Agent settings, including its relationship with Deep Security Manager.

Question 3

Recommendation scans can detect applications and/or vulnerabilities on servers on the network. Which of the following Protection Modules make use of Recommendation scans?

Options:

A.

Firewall, Application Control, and Integrity Monitoring

B.

Intrusion Prevention, Firewall, Integrity Monitoring and Log Inspection

C.

Log Inspection, Application Control, and Intrusion Prevention

D.

Intrusion Prevention, Integrity Monitoring, and Log Inspection

Question 4

Your organization would like to implement a mechanism to alert administrators when files on a protected servers are modified or tampered with. Which Deep Security Protection Module should you enable to provide this functionality?

Options:

A.

The Integrity Monitoring Protection Module

B.

The File Inspection Protection Module

C.

Deep Security can not provide this type of functionality

D.

The Intrusion Prevention Protection Module

Question 5

Where does Deep Security Manager store the credentials it uses to access the database?

Options:

A.

In the logging.properties file

B.

In the dsm.properties file

C.

In the Windows Registry

D.

In the database.properties file

Question 6

Multi-tenancy is enabled in Deep Security and new tenants are created. Where does the new tenant data get stored when using SQL Server as the Deep Security database?

Options:

A.

The new tenant data is added to the existing SQL Server database.

B.

An additional table is created for each new tenant in the existing database in the SQL Server database to store its data.

C.

An additional database is created in SQL Server for each new tenant to store its data.

D.

An additional user is created for each new tenant in the SQL Server database to store its data.

Question 7

Which of the following statements is true regarding Intrusion Prevention protection?

Options:

A.

Intrusion Prevention protection can drop malicious packets but cannot reset the con-nection.

B.

Intrusion Prevention protection only works in conjunction with the Anti-Malware Pro-tection Module.

C.

Intrusion Prevention protection can only work on computers where a Deep Security Agent is installed; agentless protection is not supported.

D.

Intrusion Prevention protection can drop or reset a connection.

Question 8

Which of following statements best describes Machine Learning in Deep Security?

Options:

A.

Machine Learning is malware detection technique in which features of an executable file are compared against a cloud-based learning model to determine the probability of the file being malware.

B.

Machine Learning is a malware detection technique in which files are scanned based on the true file type as determined by the file content, not the extension.

C.

Machine Learning is a malware detection technique in which the Deep Security Agent monitors process memory in real time and once a process is deemed to be suspicious, Deep Security will perform additional checks with the Smart Protection Network to determine if this is a known good process.

D.

Machine Learning is malware detection technique in which processes on the protected computer are monitored for actions that are not typically performed by a given process.

Question 9

A Recommendation Scan is run to determine which Intrusion Prevention rules are appropriate for a Server. The scan is configured to apply the suggested rules automatically and ongoing scans are enabled. Some time later, an operating system patch is applied. How can you de-termine which Intrusion Prevention rules are no longer needed on this Server?

Options:

A.

The READ ME file provided with the software patch will indicate which issues were addressed with this release. Compare this list to the rules that are applied to determine which rules are no longer needed and can be disabled.

B.

Since the rules are being applied automatically, when the next Intrusion Prevention Recommendation Scan is run automatically, any rules that are no longer needed will be automatically unassigned. These are rules that are no longer needed as the vulnerability was corrected with the patch.

C.

Since there is no performance effect when multiple Intrusion Prevention rules are ap-plied, there is no need to determine which rules are no longer needed. The original rec-ommended rules can remain in place without affecting the system.

D.

Since the rules are being applied automatically, when the next Intrusion Prevention Recommendation Scan is run automatically, any rules that are no longer needed will be displayed on the Recommended for Unassignment tab in the IPS Rules. These are rules that are no longer needed and can be disabled as the vulnerability was corrected with the patch.

Question 10

A Deep Security administrator wishes to monitor a Windows SQL Server database and be alerted of any critical events which may occur on that server. How can this be achieved using Deep Security?

Options:

A.

The administrator could install a Deep Security Agent on the server hosting the Win-dows Server 2016 database and enable the Integrity Monitoring Protection Module. A rule can be assigned to monitor the Windows SQL Server for any modifications to the server, with Alerts enabled.

B.

The administrator could install a Deep Security Agent on the server hosting the Win-dows Server 2016 database and enable the Log Inspection Protection Module. A rule can be assigned to monitor the Windows SQL Server for any critical events, with Alerts enabled.

C.

The administrator could install a Deep Security Agent on the server hosting the Win-dows Server 2016 database and enable the Intrusion Prevention Protection Module. A Recommendation Scan can be run and any suggested rule can be assigned to monitor the Windows SQL Server for any vulnerabilities, with Alerts enabled.

D.

This can not be achieved using Deep Security. Instead, the administrator could set up log forwarding within Window SQL Server 2016 and the administrator could monitor the logs within the syslog device.

Question 11

What is the purpose of the Deep Security Notifier?

Options:

A.

The Deep Security Notifier is a application in the Windows System Tray that displays the Status of Deep Security Manager during policy and software updates.

B.

The Deep Security Notifier is a server components that collects log entries from man-aged computers for delivery to a configured SIEM device.

C.

The Deep Security Notifier is a server component used in agentless configurations to allow Deep Security Manager to notify managed computers of pending updates.

D.

The Deep Security Notifier is a application in the Windows System Tray that com-municates the state of Deep Security Agents and Relays to endpoint computers.

Question 12

Which of the following statements correctly describes Smart Folders?

Options:

A.

Smart Folders identify the folders that will be scanned when a Real-Time, Manual or Scheduled malware scan is run.

B.

Smart Folders are a collection of subfolders containing the policy settings that are ap-plied to child policies or directly to Computers.

C.

Smart Folders act as a saved search of computers which is executed each time the folder is clicked to display its contents.

D.

Smart Folders are the containers used to store the results of Recommendation Scans. Once a Recommendation Scan has completed, and administrator can click a Smart Folder and select which of the recommended rules to apply.