Winter Special Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 713PS592

Deep-Security-Professional Trend Micro Certified Professional for Deep Security Exam Questions and Answers

Questions 4

Your VMware environment is configured without using NSX. How can Deep Security provide protection to the virtual images hosted on your ESXi servers?

Options:

A.

Without NSX, a Deep Security Agent must be installed on each virtual machine hosted on the ESXi server.

B.

Without NSX, you will be unable to use Deep Security to protect your virtual machines.

C.

You can install a Deep Security Virtual Appliance on the ESXi server. This will provide agentless support for Anti-Malware, Intrusion Prevention, Integrity Monitoring, Firewall and Web Reputation.

D.

Without NSX, you can only enable Anti-Malware and Integrity Monitoring protection on the virtual machines. NSX is required to support Intrusion Prevention, Firewall and Web Reputation

Buy Now
Questions 5

Where does Deep Security Manager store the credentials it uses to access the database?

Options:

A.

In the logging.properties file

B.

In the dsm.properties file

C.

In the Windows Registry

D.

In the database.properties file

Buy Now
Questions 6

How does Smart Scan vary from conventional pattern-based anti-malware scanning?

Options:

A.

Smart Scan improves the capture rate for malware scanning by sending features of suspicious files to an cloud-based server where the features are compared to known malware samples.

B.

Smart Scan shifts much of the malware scanning functionality to an external Smart Protection Server.

C.

Smart Scan is performed in real time, where conventional scanning must be triggered manually, or run on a schedule.

D.

Smart Scan identifies files to be scanned based on the content of the file, not the exten-sion.

Buy Now
Questions 7

An administrator enables Multi-Tenancy in Deep Security and creates multiple tenants. After a period of time, the administrator would like to review the usage and resource consumption by a specific tenant. How can the administrator retrieve this information?

Options:

A.

The administrator could check the Multi-Tenancy log file for resource consumption details.

B.

The administrator could generate a Tenant report from within the Deep Security Manager Web console.

C.

The administrator will not be able retrieve this information without licensing and ena-bling the Multi-Tenancy Chargeback module in the Deep Security Manager Web con-sole.

D.

The administrator downloads the Tenant usage details from the Deep Security Agent on the Tenant computer.

Buy Now
Questions 8

Your organization stores PDF and Microsoft Office files within the SAP Netweaver platform and requires these documents to be scanned for malware. Which Deep Security component is required to satisfy this requirement?

Options:

A.

The Netweaver plug-in must be installed on the Deep Security Agent.

B.

A Smart Protection Server must be installed and configured to service the SAP Netweaver platform

C.

No extra components are required, this can be done by enabling the AntiMalware Pro-tection Module on the SAP Netweaver server.

D.

Deep Security Scanner is required.

Buy Now
Questions 9

An administrator attempts to activate the Deep Security Agent installed on a server by typing the following command in the Command Prompt on the Deep Security Agent computer:

dsa_control -a dsm://server1.acme.com:4120

The Agent does not activate as expected. What is a valid reason for this issue?

Options:

A.

The incorrect port was used. The correct command would be: dsa_control -a dsm://server1.acme.com:4118

B.

Deep Security Agents can not be activated through the Command Prompt. They must be activated through the Deep Security Manager Web console or through a deployment script.

C.

The command listed can only executed from the Command Prompt on the Deep Security Manager computer.

D.

"Allow Agent-Initiated Activation" is currently not enabled in Deep Security Manager.

Buy Now
Questions 10

While viewing the details of the Firewall Protection Module, as displayed in the exhibit, you note that a few rules have already been assigned. You try to disable these rules, but they can not be unassigned. Why can the displayed rules not be unassigned?

Deep-Security-Professional Question 10

Options:

A.

The rules displayed in the exhibit have been hard-coded with the details of the policy. These rules will automatically be assigned to all Firewall policies that are created and can not be unassigned.

B.

The rules displayed in the exhibit have been assigned to the policy at the parent level. Rules assigned to a parent policy can not be unassigned at the child level.

C.

The rules displayed in the exhibit were assigned to the policy automatically when a Recommendation Scan was run. Rules assigned through a Recommendation Scan can not be disabled once assigned.

D.

The rules displayed in the exhibit can not be unassigned as the administrator currently logged into the Deep Security Manager Web console does not have the permissions necessary to unassign rules.

Buy Now
Questions 11

How can you prevent a file from being scanned for malware?

Options:

A.

Enable "File Types scanned by IntelliScan" in the Malware Scan Configuration prop-erties in the Deep Security Manager Web console. Click "Scan All Except" and type the filename to exclude from the scan.

B.

Edit the "Scan Exclusions" section of the dsa.properties configuration file on the Deep Security Agent computer to include the file name. Save the configuration file and restart the Deep Security Agent service.

C.

Add the file to the Exclusions list in the Malware Scan Configuration.

D.

Add the file to the Exclusions list in the "Allowed Spyware/Grayware Configuration".

Buy Now
Questions 12

Which of the following correctly describes the Firewall rule Action of Force Allow?

Options:

A.

Force Allow permits traffic that would otherwise be denied by other Firewall rules to pass, but still enforces filtering by the Intrusion Prevention Protection Module.

B.

Force Allow permits traffic to bypass analysis by both the Firewall and Intrusion Pre-vention Protection Modules.

C.

Force Allow explicitly allows traffic that matches the Firewall rule to pass, and implicitly denies all other traffic.

D.

Force Allow permits traffic to bypass analysis by all Deep Security Protection Modules.

Buy Now
Exam Name: Trend Micro Certified Professional for Deep Security Exam
Last Update: Dec 2, 2024
Questions: 80

PDF + Testing Engine

$66  $164.99

Testing Engine

$50  $124.99
buy now Deep-Security-Professional testing engine

PDF (Q&A)

$42  $104.99
buy now Deep-Security-Professional pdf