March Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

Deep-Security-Professional Trend Micro Certified Professional for Deep Security Exam Questions and Answers

Questions 4

Which of the following statements is true regarding Deep Security Manager-todatabase com-munication?

Options:

A.

Deep Security Manager-to-database traffic is not encrypted by default, but can be en-abled by modifying settings in the ssl.properties file.

B.

Deep Security Manager-to-database traffic is encrypted by default, but can be disabled by modifying settings in the dsm.properties file.

C.

Deep Security Manager-to-database traffic is encrypted by default but can be disabled by modifying settings in the db.properties file.

D.

Deep Security Manager-to-database traffic is not encrypted by default, but can be en-abled by modifying settings in the dsm.properties file.

Buy Now
Questions 5

Which of the following statements is true regarding Maintenance Mode in the Application Control protection Module?

Options:

A.

While in Maintenance Mode, all Block and Allow rules are ignored while new or updated applications are added to the software inventory

B.

When in Maintenance Mode, the Application Control Protection Module will continue to block software identified in Block rules, but will allow new and changed applications to be added to the software inventory.

C.

When enabled, Maintenance Mode rescans the protected computer to rebuild the soft-ware inventory. Any new or changed software will be included in this rebuilt inventory.

D.

Maintenance Mode can be configured as a Scheduled Event. In this scenario, all soft-ware upgrades will be performed at the same time every day to avoid creating Alerts for normal software updates.

Buy Now
Questions 6

Which of the following correctly describes the Firewall rule Action of Force Allow?

Options:

A.

Force Allow permits traffic that would otherwise be denied by other Firewall rules to pass, but still enforces filtering by the Intrusion Prevention Protection Module.

B.

Force Allow permits traffic to bypass analysis by both the Firewall and Intrusion Pre-vention Protection Modules.

C.

Force Allow explicitly allows traffic that matches the Firewall rule to pass, and implicitly denies all other traffic.

D.

Force Allow permits traffic to bypass analysis by all Deep Security Protection Modules.

Buy Now
Questions 7

Based on the policy configuration displayed in the exhibit, which of the following statements is true?

Options:

A.

Changes to any of the Deep Security policies will be send to the Deep Security Agents as soon as the changes are saved.

B.

Administrators with access to the protected Server will be able to uninstall the Deep Security Agent through Windows Control Panel.

C.

Deep Security Agents will send event information to Deep Security Manager every 10 minutes.

D.

If the Deep Security Manager does not receive a message from the Deep Security agent every 20 minutes, an alert will be raised.

Buy Now
Questions 8

Which of the following statements is FALSE regarding Firewall rules using the Bypass action?

Options:

A.

Applying a Firewall rule using the Bypass action to traffic in one direction automatically applies the same action to traffic in the other direction.

B.

Firewall rules using the Bypass action do not generate log events.

C.

Firewall rules using the Bypass action allow incoming traffic to skip both Firewall and Intrusion Prevention analysis.

D.

Firewall rules using the Bypass action can be optimized, allowing traffic to flow as effi-ciently as if a Deep Security Agent was not there.

Buy Now
Questions 9

Which of the following is not an operation that is performed when network traffic is intercepted by the network driver on the Deep Security Agent?

Options:

A.

Analyze the packet within the context of traffic history and connection state.

B.

Compare the data in the packet against the Anti-Malware Scan Configuration to verify whether any of the data related to files and folders on the Exclusion list.

C.

Verify the integrity of the packet to insure the packet is suitable for analysis.

D.

Verify the packet is not part of a reconnaissance scan used to discover weaknesses on the Deep Security Agent host computer.

Buy Now
Questions 10

How is scan caching used in agentless implementations of Deep Security?

Options:

A.

Scan caching maintains the Inclusions and Exclusions lists from the Malware Scan Configuration in memory to improve performance.

B.

Scan caching manages resource usage by staggering the launch of malware scans to prevent scan storms

C.

Scan caching is used in Agent-based installations only and is not supported in an agentless implementation.

D.

Scan caching enhances the performance of the Deep Security Virtual Appliance in that files scanned for malware on a virtual machine that appear on other virtual machines may not need to be scanned again.

Buy Now
Questions 11

Recommendation scans can detect applications and/or vulnerabilities on servers on the network. Which of the following Protection Modules make use of Recommendation scans?

Options:

A.

Firewall, Application Control, and Integrity Monitoring

B.

Intrusion Prevention, Firewall, Integrity Monitoring and Log Inspection

C.

Log Inspection, Application Control, and Intrusion Prevention

D.

Intrusion Prevention, Integrity Monitoring, and Log Inspection

Buy Now
Questions 12

What is the effect of the Firewall rule displayed in the following exhibit?

Options:

A.

This rule will allow incoming TCP and UPD communication to this server.

B.

This rule will allow outgoing TCP and UPD communication from this server.

C.

This rule will allow TCP and UPD replies to requests originating on this server.

D.

This rule will allow incoming communication to this server, but not TCP and UPD.

Buy Now
Exam Name: Trend Micro Certified Professional for Deep Security Exam
Last Update: Mar 28, 2024
Questions: 80
Deep-Security-Professional pdf

Deep-Security-Professional PDF

$28  $80
Deep-Security-Professional Engine

Deep-Security-Professional Testing Engine

$33.25  $95
Deep-Security-Professional PDF + Engine

Deep-Security-Professional PDF + Testing Engine

$45.5  $130