Trend Deep-Security-Professional Trend Micro Certified Professional for Deep Security Exam Practice Test

Page: 1 / 14
Total 80 questions
Question 1

How is scan caching used in agentless implementations of Deep Security?



Answer : D


Question 2

The Intrusion Prevention Protection Module is enabled and a Recommendation Scan is run to identify vulnerabilities on a Windows Server 2016 computer. How can you insure that the list of recommendations is always kept up to date?



Answer : C


Question 3

A Deep Security administrator wishes to monitor a Windows SQL Server database and be alerted of any critical events which may occur on that server. How can this be achieved using Deep Security?



Answer : B


Question 4

As the administrator in a multi-tenant environment, you would like to monitor the usage of security services by tenants? Which of the following are valid methods for monitoring the usage of the system by the tenants?



Answer : B

Deep Security Manager records data about tenant usage. This information is displayed in the Ten-ant Protection Activity widget on the Dashboard, the Statistics tab in tenant Properties, and the Chargeback report.

This information can also be accessed through the Status Monitoring REST API which can be enabled or disabled from the Administration > Advanced > System Settings > Advanced > Status Monitoring API.

multi-tenancy

Explication: Study Guide - page (422)


Question 5

The "Protection Source when in Combined Mode" settings are configured for a virtual machine as in the exhibit. You would like to enable Application Control on this virtual machine, but there is no corresponding setting displayed. Why?



Answer : B


Question 6

How does Smart Scan vary from conventional pattern-based anti-malware scanning?



Answer : B

Advantages of the Smart Scan pattern over the conventional pattern protection in OfficeScan (OSCE)


Question 7

Multi-tenancy is enabled in Deep Security and new tenants are created. Where does the new tenant data get stored when using SQL Server as the Deep Security database?



Answer : C

With Microsoft SQL and PostgreSQL, there's one main database and an additional database for each tenant. With Oracle, all tenant information is in one Deep Security Manager database, but an additional user is created for each tenant. Each user has its own tables.

Explication: Study Guide - page (409)


Page:    1 / 14   
Total 80 questions