Trend Deep-Security-Professional Trend Micro Certified Professional for Deep Security Exam Practice Test

Page: 1 / 14
Total 80 questions
Question 1

Recommendation scans can detect applications and/or vulnerabilities on servers on the network. Which of the following Protection Modules make use of Recommendation scans?



Answer : D

Recommendation Scans can suggest rules for the following Protection Modules:

* Intrusion Prevention

* Integrity Monitoring

* Log Inspection

Explication: Study Guide - page (161)


Question 2

Which of the following operations makes use of the Intrusion Prevention Protection Module?



Answer : D


Question 3

Which of the following VMware components is not required to enable agentless protection using Deep Security.



Answer : C

Integrate with VMware vRealize Operations Manager


Question 4

What is the purpose of the Deep Security Notifier?



Answer : D

The Deep Security Notifier is a Windows System Tray application which provides local notification when malware is detected or malicious URLs are blocked.

It may be installed separately on protected virtual machines, however the Anti-Malware Protection Module must be licensed and enabled on the virtual machine for the Deep Security Notifier to display information.

The Notifier displays pop-up user notifications when the Anti-Malware module begins a scan, or blocks malware or access to malicious web pages. The Notifier also provides a console utility that allows the user to view events.

Explication: Study Guide - page (442)


Question 5

Which of the following is not an operation that is performed when network traffic is intercepted by the network driver on the Deep Security Agent?



Answer : B


Question 6

What is the purpose of the override.properties file?



Answer : B

The properties specified in this configuration file override the properties specified in the dsm.properties file. This file can be created manually by a support engineer to modify product be-havior without affecting the original configuration.

Explication: Study Guide - page (42)


Question 7

Which of the following Firewall rule actions will allow data packets to pass through the Firewall Protection Module without being subjected to analysis by the Intrusion Prevention Protection Module?



Answer : B


Page:    1 / 14   
Total 80 questions