Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

Deep-Security-Professional Exam Dumps - Trend Micro Deep Security Questions and Answers

Question # 4

What is the purpose of the override.properties file?

Options:

A.

This file is used to transfer policy settings from one installation of Deep Security Man-ager to another

B.

This file allows properties to be tested on Deep Security Manager without affecting the original configuration.

C.

This file contains the original out-of-the-box configuration properties for Deep Security Manager. This file is renamed to dsm.properties upon initialization of Deep Security Manager.

D.

This file allows Deep Security Agents to override enforced behavior by providing new policy configuration details.

Buy Now
Question # 5

Which of following statements best describes Machine Learning in Deep Security?

Options:

A.

Machine Learning is malware detection technique in which features of an executable file are compared against a cloud-based learning model to determine the probability of the file being malware.

B.

Machine Learning is a malware detection technique in which files are scanned based on the true file type as determined by the file content, not the extension.

C.

Machine Learning is a malware detection technique in which the Deep Security Agent monitors process memory in real time and once a process is deemed to be suspicious, Deep Security will perform additional checks with the Smart Protection Network to determine if this is a known good process.

D.

Machine Learning is malware detection technique in which processes on the protected computer are monitored for actions that are not typically performed by a given process.

Buy Now
Question # 6

When viewing the details for a policy, as displayed in the exhibit, you notice that the Application Control Protection Module is not available. In this example, why would this Protection Modules not be available?

Options:

A.

The Application Control Protection Module has been disabled at the Base Policy level and is not displayed in the details for child policies.

B.

The Application Control Protection Module is only supported on Linux computers, the policy details displayed are for Windows computers only.

C.

An Activation Code for the Application Control Protection Module has not been pro-vided. Unlicensed Protection Modules will not be displayed.

D.

The Application Control Protection Modules has not been enabled for this tenant.

Buy Now
Question # 7

Based on the following exhibit, what behavior would you expect for the Application Control Protection Module?

Options:

A.

Since this computer is in Maintenance Mode, updates to the Application Control Pro-tection Module will be applied.

B.

Since this computer is in Maintenance Mode, new or changed software will be auto-matically added to the list of Allowed software in the currently active ruleset.

C.

Since this computer is in Maintenance Mode, Application Control will allow any Blocked software to temporarily run

D.

Since this computer is in Maintenance Mode, Application Control will ignore any Blocked software in the currently active ruleset.

Buy Now
Question # 8

What is IntelliScan?

Options:

A.

IntelliScan is a method of identifying which files are subject to malware scanning as determined from the file content. It uses the file header to verify the true file type.

B.

IntelliScan is a mechanism that improves scanning performance. It recognizes files that have already been scanned based on a digital fingerprint of the file.

C.

IntelliScan reduces the risk of viruses entering your network by blocking real-time compressed executable files and pairs them with other characteristics to improve mal-ware catch rates.

D.

IntelliScan is a malware scanning method that monitors process memory in real time. It can identify known malicious processes and terminate them.

Buy Now
Question # 9

Based on the policy configuration displayed in the exhibit, which of the following statements is true?

Options:

A.

Changes to any of the Deep Security policies will be send to the Deep Security Agents as soon as the changes are saved.

B.

Administrators with access to the protected Server will be able to uninstall the Deep Security Agent through Windows Control Panel.

C.

Deep Security Agents will send event information to Deep Security Manager every 10 minutes.

D.

If the Deep Security Manager does not receive a message from the Deep Security agent every 20 minutes, an alert will be raised.

Buy Now
Question # 10

A Deep Security administrator wishes to monitor a Windows SQL Server database and be alerted of any critical events which may occur on that server. How can this be achieved using Deep Security?

Options:

A.

The administrator could install a Deep Security Agent on the server hosting the Win-dows Server 2016 database and enable the Integrity Monitoring Protection Module. A rule can be assigned to monitor the Windows SQL Server for any modifications to the server, with Alerts enabled.

B.

The administrator could install a Deep Security Agent on the server hosting the Win-dows Server 2016 database and enable the Log Inspection Protection Module. A rule can be assigned to monitor the Windows SQL Server for any critical events, with Alerts enabled.

C.

The administrator could install a Deep Security Agent on the server hosting the Win-dows Server 2016 database and enable the Intrusion Prevention Protection Module. A Recommendation Scan can be run and any suggested rule can be assigned to monitor the Windows SQL Server for any vulnerabilities, with Alerts enabled.

D.

This can not be achieved using Deep Security. Instead, the administrator could set up log forwarding within Window SQL Server 2016 and the administrator could monitor the logs within the syslog device.

Buy Now
Question # 11

Based on the configuration setting highlighted in the exhibit, what behavior can be expected during a malware scan?

Options:

A.

With the highlighted setting enabled, Deep Security Agents will scan files for known viruses and malware using patterns and any files deemed suspicious will be submitted to a configured Deep Discovery Analyzer for further analysis.

B.

With the highlighted setting enabled, Deep Security Agents will scan files for viruses and malware using supplementary aggressive detection pattern files.

C.

With the highlighted setting enabled, Deep Security Agents will scan files for unknown malware using Predictive Machine Learning.

D.

With the highlighted setting enabled, Deep Security Agents will scan files for known malware as well as newly encounted malware by accessing the Suspicious Objects List.

Buy Now
Question # 12

A Recommendation Scan is run to determine which Intrusion Prevention rules are appropriate for a Server. The scan is configured to apply the suggested rules automatically and ongoing scans are enabled. Some time later, an operating system patch is applied. How can you de-termine which Intrusion Prevention rules are no longer needed on this Server?

Options:

A.

The READ ME file provided with the software patch will indicate which issues were addressed with this release. Compare this list to the rules that are applied to determine which rules are no longer needed and can be disabled.

B.

Since the rules are being applied automatically, when the next Intrusion Prevention Recommendation Scan is run automatically, any rules that are no longer needed will be automatically unassigned. These are rules that are no longer needed as the vulnerability was corrected with the patch.

C.

Since there is no performance effect when multiple Intrusion Prevention rules are ap-plied, there is no need to determine which rules are no longer needed. The original rec-ommended rules can remain in place without affecting the system.

D.

Since the rules are being applied automatically, when the next Intrusion Prevention Recommendation Scan is run automatically, any rules that are no longer needed will be displayed on the Recommended for Unassignment tab in the IPS Rules. These are rules that are no longer needed and can be disabled as the vulnerability was corrected with the patch.

Buy Now
Question # 13

Which of the following statements is true regarding Firewall Rules?

Options:

A.

Firewall Rules applied to Policy supersede similar rules applied to individuals computers.

B.

When traffic is intercepted by the network filter, Firewall Rules in the policy are always applied before any other processing is done.

C.

Firewall Rules applied through a parent-level Policy cannot be unassigned in a child-level policy.

D.

Firewall Rules are always processed in the order in which they appear in the rule list, as displayed in the Deep Security manager Web console.

Buy Now
Exam Name: Trend Micro Certified Professional for Deep Security Exam
Last Update: Feb 22, 2025
Questions: 80
Deep-Security-Professional pdf

Deep-Security-Professional PDF

$25.5  $84.99
Deep-Security-Professional Engine

Deep-Security-Professional Testing Engine

$28.5  $94.99
Deep-Security-Professional PDF + Engine

Deep-Security-Professional PDF + Testing Engine

$40.5  $134.99