Pass the Trend Micro Deep Security Deep-Security-Professional Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

The Intrusion Prevention Protection Module is enabled, but the traffic it is trying to analyze is encrypted through https. How is it possible for the Intrusion Prevention Protection Module to monitor this encrypted traffic against the assigned rules?

Options:

A.

It is possible to monitor the https traffic by creating an SSL Configuration. Creating a new SSL Configuration will make the key information needed to decrypt the traffic available to the Deep Security Agent.


B.

The Intrusion Prevention Protection Module is not able to analyze encrypted https traffic.


C.

The Intrusion Prevention Protection Module can only analyze https traffic originating from other servers hosting a Deep Security Agent.


D.

The Intrusion Prevention Protection Module can analyze https traffic if the public cer-tificate of the originating server is imported into the certificate store on the Deep Secu-rity Agent computer.


Expert Solution
Questions # 2:

What is the purpose of the override.properties file?

Options:

A.

This file is used to transfer policy settings from one installation of Deep Security Man-ager to another


B.

This file allows properties to be tested on Deep Security Manager without affecting the original configuration.


C.

This file contains the original out-of-the-box configuration properties for Deep Security Manager. This file is renamed to dsm.properties upon initialization of Deep Security Manager.


D.

This file allows Deep Security Agents to override enforced behavior by providing new policy configuration details.


Expert Solution
Questions # 3:

Based on the script displayed in the exhibit, which of the following statements are correct? Select all that apply.

Question # 3

Options:

A.

Deep Security Agents deployed using this script will be activated against Tenant 0 in a multi-tenant environment.


B.

This script will deploy the Deep Security Agent on a server, but will not automatically activate it.


C.

Deep Security Agents deployed using this script are activated against a specific tenant.


D.

Deep Security Agents deployed using this script will be assigned a specific policy when activated.


Expert Solution
Questions # 4:

Which of the following are valid methods for pre-approving software updates to prevent Ap-plication Control Events from being triggered by the execution of the modified software? Select all that apply.

Options:

A.

Once the inventory scan has run when Application Control is first enabled, there is no way to update the inventory to incorporate modified software.


B.

Software updates performed by a Trusted Updater will be automatically approved.


C.

Edit the inventory database file (AC.db) on the Agent computer to include the hash of the newly updated software. Save the change and restart the Deep Security Agent. The software updates will now be approved.


D.

Maintenance mode can be enabled while completing the updates.


Expert Solution
Questions # 5:

The "Protection Source when in Combined Mode" settings are configured for a virtual machine as in the exhibit. You would like to enable Application Control on this virtual machine, but there is no corresponding setting displayed. Why?

Question # 5

Options:

A.

In the example displayed in the exhibit, no activation code was entered for Application Control. Since the Protection Module is not licensed, the corresponding settings are not displayed.


B.

These settings are used when both a host-based agent and agentless protection are available for the virtual machine. Since Application Control is not supported in agentless installations, there is no need for the setting.


C.

In the example displayed in the exhibit, the Application Control Protection Module has not yet been enabled. Once it is enabled for this virtual machine, the corresponding settings are displayed.


D.

In the example displayed in the exhibit, the VMware Guest Introspection Service has not yet been installed. This service is required to enable Application Control in agentless installations.


Expert Solution
Questions # 6:

Which of the following file types would not be evaluated by the Application Control Protection Module?

Options:

A.

.py scripts


B.

.exe files


C.

.class files


D.

.docx files


Expert Solution
Questions # 7:

Which of the following are valid methods for forwarding Event information from Deep Secu-rity? Select all that apply.

Options:

A.

Simple Network Management Protocol (SNMP)


B.

Deep Security Application Programming Interface (API)


C.

Amazon Simple Notification Service (SNS)


D.

Security Information and Event Management (SIEM)


Expert Solution
Questions # 8:

An administrator enables Multi-Tenancy in Deep Security and creates multiple tenants. After a period of time, the administrator would like to review the usage and resource consumption by a specific tenant. How can the administrator retrieve this information?

Options:

A.

The administrator could check the Multi-Tenancy log file for resource consumption details.


B.

The administrator could generate a Tenant report from within the Deep Security Manager Web console.


C.

The administrator will not be able retrieve this information without licensing and ena-bling the Multi-Tenancy Chargeback module in the Deep Security Manager Web con-sole.


D.

The administrator downloads the Tenant usage details from the Deep Security Agent on the Tenant computer.


Expert Solution
Questions # 9:

Your organization stores PDF and Microsoft Office files within the SAP Netweaver platform and requires these documents to be scanned for malware. Which Deep Security component is required to satisfy this requirement?

Options:

A.

The Netweaver plug-in must be installed on the Deep Security Agent.


B.

A Smart Protection Server must be installed and configured to service the SAP Netweaver platform


C.

No extra components are required, this can be done by enabling the AntiMalware Pro-tection Module on the SAP Netweaver server.


D.

Deep Security Scanner is required.


Expert Solution
Questions # 10:

Which of the following statements is true regarding Firewall Rules?

Options:

A.

Firewall Rules applied to Policy supersede similar rules applied to individuals computers.


B.

When traffic is intercepted by the network filter, Firewall Rules in the policy are always applied before any other processing is done.


C.

Firewall Rules applied through a parent-level Policy cannot be unassigned in a child-level policy.


D.

Firewall Rules are always processed in the order in which they appear in the rule list, as displayed in the Deep Security manager Web console.


Expert Solution
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions