Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Trend Micro Deep-Security-Professional Practice Exam with Questions & Answers

Questions 1

What is the result of performing a Reset operation on a Deep Security Agent?

Options:
A.

A Reset operation generates Event information that can be used to troubleshoot Agent-to -Manager communication issues.

B.

A Reset operation forces an update to the Deep Security Agent software installed on a managed computer.

C.

A Reset operation forces the Deep Security Agent service to restart on the managed computer.

D.

A Reset operation wipes out any Deep Security Agent settings, including its relationship with Deep Security Manager.

Questions 2

Which of the following is not an operation that is performed when network traffic is intercepted by the network driver on the Deep Security Agent?

Options:
A.

Analyze the packet within the context of traffic history and connection state.

B.

Compare the data in the packet against the Anti-Malware Scan Configuration to verify whether any of the data related to files and folders on the Exclusion list.

C.

Verify the integrity of the packet to insure the packet is suitable for analysis.

D.

Verify the packet is not part of a reconnaissance scan used to discover weaknesses on the Deep Security Agent host computer.

Questions 3

The Overrides settings for a computer are displayed in the exhibit. Which of the following statements is true regarding the displayed configuration?

Deep-Security-Professional Question 3

Options:
A.

The Web Reputation and Application Control Protection Modules have been assigned a different policy that the other Protection Modules and as a result, are displayed with overrides.

B.

The configuration for the Protection Modules is inherited from the policy assigned to this computer, except for the configuration of the Web Reputation and Application Control Protection Modules which have been set at the computer level.

C.

The Protection Modules identified as Inherited in the exhibit have not yet been config-ured. Only the Web Reputation and Application Control Protection Modules have been configured.

D.

The Protection Modules identified as Inherited in the exhibit have not yet been enabled. Only the Web Reputation and Application Control Protection Modules have been enabled at this point.

Questions 4

Which of the following statements is correct regarding the policy settings displayed in the exihibit?

Deep-Security-Professional Question 4

Options:
A.

The Heartbeat interval value displayed in this policy is inherited from the parent policy

B.

Deep Security Agents using the displayed policy will send event details to Deep Security Manager every 5 minutes.

C.

All Deep Security Agents will send event details to Deep Security Manager every 5 minutes.

D.

Deep Security Manager will refresh the policy details on the Deep Security Agents using this policy every 5 minutes.

Questions 5

Which of the following statements is false regarding the Log Inspection Protection Module?

Options:
A.

Custom Log Inspections rules can be created using the Open Source Security (OSSEC) standard.

B.

Deep Security Manager collects Log Inspection Events from Deep Security Agents at every heartbeat.

C.

The Log Inspection Protection Module is supported in both agent-based and agentless environments.

D.

Scan for Recommendations identifies Log Inspection rules that Deep Security should implement.

Questions 6

How is scan caching used in agentless implementations of Deep Security?

Options:
A.

Scan caching maintains the Inclusions and Exclusions lists from the Malware Scan Configuration in memory to improve performance.

B.

Scan caching manages resource usage by staggering the launch of malware scans to prevent scan storms

C.

Scan caching is used in Agent-based installations only and is not supported in an agentless implementation.

D.

Scan caching enhances the performance of the Deep Security Virtual Appliance in that files scanned for malware on a virtual machine that appear on other virtual machines may not need to be scanned again.

Questions 7

Your organization stores PDF and Microsoft Office files within the SAP Netweaver platform and requires these documents to be scanned for malware. Which Deep Security component is required to satisfy this requirement?

Options:
A.

The Netweaver plug-in must be installed on the Deep Security Agent.

B.

A Smart Protection Server must be installed and configured to service the SAP Netweaver platform

C.

No extra components are required, this can be done by enabling the AntiMalware Pro-tection Module on the SAP Netweaver server.

D.

Deep Security Scanner is required.

Questions 8

The "Protection Source when in Combined Mode" settings are configured for a virtual machine as in the exhibit. You would like to enable Application Control on this virtual machine, but there is no corresponding setting displayed. Why?

Deep-Security-Professional Question 8

Options:
A.

In the example displayed in the exhibit, no activation code was entered for Application Control. Since the Protection Module is not licensed, the corresponding settings are not displayed.

B.

These settings are used when both an host-based agent and agentless protection are available for the virtual machine. Since Application Control is not supported in agentless installations, there is no need for the setting.

C.

In the example displayed in the exhibit, the Application Control Protection Module has not yet been enabled. Once it is enabled for this virtual machine, the corresponding settings are displayed.

D.

In the example displayed in the exhibit, the VMware Guest Introspection Service has not yet been installed. This service is required to enable Application Control in agentless installations.

Questions 9

How is caching used by the Web Reputation Protection Module?

Options:
A.

Caching is used by the Web Reputation Protection Module to temporarily store the credibility score for a Web site. The retrieved credibility score is cached in case the score for the Web site is required again for the life of the cache.

B.

Caching is used by the Web Reputation Protection Module to temporarily store the pages that make up the Web site. The Web site is cached in case the site is visited again for the life of the cache.

C.

Caching is used by the Web Reputation Protection Module to keep track of Web sites that are added to the Allowed list. Any sites added to the Allowed list will be accessible by protected servers regardless of their credibility score.

D.

Caching is used by the Web Reputation Protection Module to keep track of Allowed and Blocked Web sites. Any sites that are Allowed or Blocked do not require the retrieval of a credibility score from the Trend Micro Web Reputation Service.

Questions 10

Policies in Deep Security can include a Context value. Which of the following statements re-garding Context is correct?

Options:
A.

The Context provides Deep Security Agents with location awareness and are associated with Anti-Malware and Web Reputation Rules.

B.

The Context provides Deep Security Agents with location awareness and are associated with Firewall and Intrusion Prevention Rules.

C.

The Context provides Deep Security Agents with location awareness and are associated with Web Reputation Rules only.

D.

The Context provides Deep Security Agents with location awareness and are associated with Log Inspection and Integrity Monitoring Rules.

Certification Provider: Trend Micro
Exam Name: Trend Micro Certified Professional for Deep Security Exam
Last Update: Jun 17, 2025
Questions: 80

Trend Micro Free Exams

Trend Micro Free Exams
Get the best free Trend Micro exam study materials and practice tests at Examstrack. Perfect your Trend Micro preparation by visiting Examstrack.