Trend Micro Certified Professional for Deep Security Exam Practice Test

Page: 1 / 14
Total 80 questions
Question 1

Recommendation scans can detect applications and/or vulnerabilities on servers on the network. Which of the following Protection Modules make use of Recommendation scans?



Answer : D

Recommendation Scans can suggest rules for the following Protection Modules:

* Intrusion Prevention

* Integrity Monitoring

* Log Inspection

Explication: Study Guide - page (161)


Question 2

Based on the policy configuration displayed in the exhibit, which of the following statements is true?



Answer : B


Question 3

Which of the following statements is true regarding the Intrusion Prevention Protection Module?



Answer : B

deep-security-protection-modules


Question 4

Policies in Deep Security can include a Context value. Which of the following statements re-garding Context is correct?



Answer : B

Contexts are designed to be associated with Firewall and Intrusion Prevention Rules. If the condi-tions defined in the Context associated with a rule are met, the rule is applied. To link a security rule to a Context, go to the Options tab in the Properties window for the rule and select the Context from the menu.

Explication: Study Guide - page (165)


Question 5

Which of the following statements is false regarding the Log Inspection Protection Module?



Answer : C

Log Inspection requires running some analysis on the computer and is not supported in Agentless deployments.

Explication: Study Guide - page (310)


Question 6

Which of the following statements is true regarding Event Tagging?



Answer : C


Question 7

Which of the following operations makes use of the Intrusion Prevention Protection Module?



Answer : D


Page:    1 / 14   
Total 80 questions