Pass the Trend Micro Deep Security Deep-Security-Professional Questions and answers with CertsForce

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

The Intrusion Prevention Protection Module is enabled and a Recommendation Scan is run to identify vulnerabilities on a Windows Server 2016 computer. How can you insure that the list of recommendations is always kept up to date?

Options:

A.

Disabling, then re-enabling the Intrusion Prevention Protection Module will trigger a new Recommendation Scan to be run. New rules will be included in the results of this new scan.


B.

Recommendation Scans are only able to suggest Intrusion Prevention rules when the Protection Module is initially enabled.


C.

Enable "Ongoing Scans" to run a recommendation scan on a regular basis. This will identify new Intrusion Prevention rules to be applied.


D.

New rules are configured to be automatically sent to Deep Security Agents when Recommendation Scans are run.


Expert Solution
Questions # 12:

What is IntelliScan?

Options:

A.

IntelliScan is a method of identifying which files are subject to malware scanning as determined from the file content. It uses the file header to verify the true file type.


B.

IntelliScan is a mechanism that improves scanning performance. It recognizes files that have already been scanned based on a digital fingerprint of the file.


C.

IntelliScan reduces the risk of viruses entering your network by blocking real-time compressed executable files and pairs them with other characteristics to improve mal-ware catch rates.


D.

IntelliScan is a malware scanning method that monitors process memory in real time. It can identify known malicious processes and terminate them.


Expert Solution
Questions # 13:

The maximum disk space limit for the Identified Files folder is reached. What is the expected Deep Security Agent behavior in this scenario?

Options:

A.

Any existing files are in the folder are compressed and forwarded to Deep Security Manager to free up disk space.


B.

Deep Security Agents will delete any files that have been in the folder for more than 60 days.


C.

Files will no longer be able to be quarantined. Any new files due to be quarantined will be deleted instead.


D.

Deep Security Agents will delete the oldest files in this folder until 20% of the allocated space is available.


Expert Solution
Questions # 14:

Which of the following statements is true regarding Event Tagging?

Options:

A.

Adding a tag to an Event modifies the Event data by adding fields, including the name of the tag, the date the tag was applied, and whether the tag was applied manually or automatically


B.

Only a single tag can be assigned to an Event.


C.

Events can be tagged automatically if they are similar to known good Events.


D.

Events can be automatically deleted based on tags.


Expert Solution
Questions # 15:

In the policy displayed in the exhibit, the state of the Web Reputation Protection Module is set to "Inherited (On)", while the state for the other Protection Module is set to "On". Why is the Web Reputation Protection Module displayed differently than the other Protection Modules.

Question # 15

Options:

A.

In this example, the state for the Web Reputation Protection Module is inherited from the parent policy, while the other Protection Modules were turned on specifically in this child policy.


B.

The state for a Protection Module is always displayed as "Inherited (On)" until the module components are installed on the Deep Security Agent.


C.

In this example, the state for the Web Reputation Protection Module is inherited from the parent policy, while the other Protection Modules were turned on at the computer level.


D.

In this example, the state for the Web Reputation Protection Module is listed as "In-herited (On)" as it was inherited from the default setting in the Base Policy.


Expert Solution
Questions # 16:

Based on the details of event displayed in the exhibit, which of the following statements is false?

Question # 16

Options:

A.

You can instruct the Deep Security Agents and Appliances to block traffic from the source IP address for a period of time.


B.

You can create a firewall rule to permanently block traffic from the originating IP ad-dress.


C.

The scan may be generated from an IP address which may be known to you. If so, the source IP address can be added to the reconnaissance whitelist.


D.

The Intrusion Prevention Protection Modules must be enabled to detect reconnaissance scans.


Expert Solution
Questions # 17:

Which of the following statements is true regarding the Log Inspection Protection Module?

Options:

A.

Deep Security Agents forward Log Inspection Event details to Deep Security Manager in real time.


B.

Log Inspection can only examine new Events and cannot examine logs entries created before the Protection Module was enabled.


C.

Log Inspection can only examine Deep Security log information.


D.

The Log Inspection Protection Module is supported in both Agent-based and Agentless implementations.


Expert Solution
Questions # 18:

Policies in Deep Security can include a Context value. Which of the following statements re-garding Context is correct?

Options:

A.

The Context provides Deep Security Agents with location awareness and are associated with Anti-Malware and Web Reputation Rules.


B.

The Context provides Deep Security Agents with location awareness and are associated with Firewall and Intrusion Prevention Rules.


C.

The Context provides Deep Security Agents with location awareness and are associated with Web Reputation Rules only.


D.

The Context provides Deep Security Agents with location awareness and are associated with Log Inspection and Integrity Monitoring Rules.


Expert Solution
Questions # 19:

Which of the following VMware components is not required to enable agentless protection using Deep Security.

Options:

A.

VMware NSX


B.

VMware ESXi


C.

VMware vRealize


D.

VMware vCenter


Expert Solution
Questions # 20:

A collection of servers protected by Deep Security do not have Internet access. How can Smart Scan be used on these computers?

Options:

A.

Install a Smart Protection Server in the environment and set it as the source for File Reputation information.


B.

Smart Scan must contact the Smart Protection Network to function. Any servers without Internet access will be unable to use Smart Scan.


C.

Promote one of the Deep Security Agents on the air gapped computers to become a Relay.


D.

Smart Scan can be configured to use a local pattern file containing the same information as the Smart Protection Network.


Expert Solution
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions