Trend Micro Certified Professional for Deep Security Deep-Security-Professional Exam Questions

Page: 1 / 14
Total 80 questions
Question 1

What is the effect of the Firewall rule displayed in the following exhibit?



Answer : A


Question 2

Multiple Application Control Events are being displayed in Deep Security after a series of ap-plication updates and the administrator would like to reset Application Control. How can this be done?



Answer : C


Question 3

What is IntelliScan?



Answer : A


Question 4

Which of the following statements is true regarding Deep Security Relays?



Answer : D


Question 5

The Intrusion Prevention Protection Module is enabled, but the traffic it is trying to analyze is encrypted through https. How is it possible for the Intrusion Prevention Protection Module to monitor this encrypted traffic against the assigned rules?



Answer : A

inrusion-prevention-ssl-traffic


Question 6

What is the role of Apex Central in the Connected Threat Defense infrastructure?



Answer : D

1 Deep Security Agents are configured with rules to enable detection of malware on the protected computers.

2 Objects deemed to be suspicious are gathered and submitted to Deep Security Manager.

3 Deep Security Manager submits the suspicious objects to Deep Discovery Analyzer for analysis.

4 Deep Discovery Analyzer executes and observes the suspicious object in a secure, isolated virtual sandbox environment.

5 Deep Discovery Analyzer pushes the analysis results to Trend Micro Apex Central, where an action can be specified for the file based on the analysis. Once the action is specified, a list of emerging threats called a Suspicious Object List is created or updated. Other Trend Micro products, such as Apex One, Deep Discovery Inspector or Deep Discovery Email Inspector, may also be connected to Trend Micro Apex Central and be able to update the list.

6 Deep Security Manager receives the list of suspicious objects from Apex Central.

7 The list is forwarded to Deep Security Agents where protection against the suspicious object is applied. Anti-Malware policies define how suspicious objects are to be handled.

Explication: Study Guide - page (387)


Question 7

What is the purpose of the Deep Security Notifier?



Answer : D

The Deep Security Notifier is a Windows System Tray application which provides local notification when malware is detected or malicious URLs are blocked.

It may be installed separately on protected virtual machines, however the Anti-Malware Protection Module must be licensed and enabled on the virtual machine for the Deep Security Notifier to display information.

The Notifier displays pop-up user notifications when the Anti-Malware module begins a scan, or blocks malware or access to malicious web pages. The Notifier also provides a console utility that allows the user to view events.

Explication: Study Guide - page (442)


Page:    1 / 14   
Total 80 questions