Trend Micro Certified Professional for Deep Security Deep-Security-Professional Exam Practice Test

Page: 1 / 14
Total 80 questions
Question 1

Which of the following are valid methods for pre-approving software updates to prevent Ap-plication Control Events from being triggered by the execution of the modified software? Select all that apply.



Answer : B, D

Normally, you will want Application Control to alert you when there are any unexpected software updates. However, some updates are expected and you will need provide allowances for these up-dates. Two methods for pre-approving software updates includes maintenance mode and trusted installers.

Explication: Study Guide - page (303-304)


Question 2

Multi-tenancy is enabled in Deep Security and new tenants are created. Where does the new tenant data get stored when using SQL Server as the Deep Security database?



Answer : C

With Microsoft SQL and PostgreSQL, there's one main database and an additional database for each tenant. With Oracle, all tenant information is in one Deep Security Manager database, but an additional user is created for each tenant. Each user has its own tables.

Explication: Study Guide - page (409)


Question 3

Which of the following is not an operation that is performed when network traffic is intercepted by the network driver on the Deep Security Agent?



Answer : B


Question 4

A Deep Security administrator wishes to monitor a Windows SQL Server database and be alerted of any critical events which may occur on that server. How can this be achieved using Deep Security?



Answer : B


Question 5

A collection of servers protected by Deep Security do not have Internet access. How can Smart Scan be used on these computers.



Answer : A

Agent-airgapped


Question 6

The Intrusion Prevention Protection Module is enabled, its Behavior is set to Prevent and rules are assigned. When viewing the events, you notice that one of Intrusion Prevention rules is being triggered and an event is being logged but the traffic is not being blocked. What is a possible reason for this?



Answer : D


Question 7

Which of the following are valid methods for forwarding Event information from Deep Secu-rity? Select all that apply.



Answer : A, C, D

You can configure Deep Security Manager to instruct all managed computers to send logs to a SI-EM, Amazon Simple Notification Service or SNMP computers.

Explication: Study Guide - page (322)


Page:    1 / 14   
Total 80 questions