New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

Pearson Deep-Security-Professional New Attempt

Page: 2 / 2
Question 8

Based on the configuration setting highlighted in the exhibit, what behavior can be expected during a malware scan?

Options:

A.

With the highlighted setting enabled, Deep Security Agents will scan files for known viruses and malware using patterns and any files deemed suspicious will be submitted to a configured Deep Discovery Analyzer for further analysis.

B.

With the highlighted setting enabled, Deep Security Agents will scan files for viruses and malware using supplementary aggressive detection pattern files.

C.

With the highlighted setting enabled, Deep Security Agents will scan files for unknown malware using Predictive Machine Learning.

D.

With the highlighted setting enabled, Deep Security Agents will scan files for known malware as well as newly encounted malware by accessing the Suspicious Objects List.

Question 9

A Recommendation Scan is run to determine which Intrusion Prevention rules are appropriate for a Server. The scan is configured to apply the suggested rules automatically and ongoing scans are enabled. Some time later, an operating system patch is applied. How can you de-termine which Intrusion Prevention rules are no longer needed on this Server?

Options:

A.

The READ ME file provided with the software patch will indicate which issues were addressed with this release. Compare this list to the rules that are applied to determine which rules are no longer needed and can be disabled.

B.

Since the rules are being applied automatically, when the next Intrusion Prevention Recommendation Scan is run automatically, any rules that are no longer needed will be automatically unassigned. These are rules that are no longer needed as the vulnerability was corrected with the patch.

C.

Since there is no performance effect when multiple Intrusion Prevention rules are ap-plied, there is no need to determine which rules are no longer needed. The original rec-ommended rules can remain in place without affecting the system.

D.

Since the rules are being applied automatically, when the next Intrusion Prevention Recommendation Scan is run automatically, any rules that are no longer needed will be displayed on the Recommended for Unassignment tab in the IPS Rules. These are rules that are no longer needed and can be disabled as the vulnerability was corrected with the patch.

Question 10

Which of the following statements is true regarding Firewall Rules?

Options:

A.

Firewall Rules applied to Policy supersede similar rules applied to individuals computers.

B.

When traffic is intercepted by the network filter, Firewall Rules in the policy are always applied before any other processing is done.

C.

Firewall Rules applied through a parent-level Policy cannot be unassigned in a child-level policy.

D.

Firewall Rules are always processed in the order in which they appear in the rule list, as displayed in the Deep Security manager Web console.

Question 11

Which of the following statements is correct regarding the policy settings displayed in the exihibit?

Options:

A.

The Heartbeat interval value displayed in this policy is inherited from the parent policy

B.

Deep Security Agents using the displayed policy will send event details to Deep Security Manager every 5 minutes.

C.

All Deep Security Agents will send event details to Deep Security Manager every 5 minutes.

D.

Deep Security Manager will refresh the policy details on the Deep Security Agents using this policy every 5 minutes.

Page: 2 / 2
Pearson Deep-Security-Professional New Attempt,
Exam Name: Trend Micro Certified Professional for Deep Security Exam
Last Update: Dec 25, 2024
Questions: 80
Deep-Security-Professional pdf

Deep-Security-Professional PDF

$25.5  $84.99
Deep-Security-Professional Engine

Deep-Security-Professional Testing Engine

$28.5  $94.99
Deep-Security-Professional PDF + Engine

Deep-Security-Professional PDF + Testing Engine

$40.5  $134.99