Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Trend Micro Deep-Security-Professional Practice Exam with Questions & Answers | Set: 2

Questions 11

Which of the following statements is true regarding Event Tagging?

Options:
A.

Adding a tag to an Event modifies the Event data by adding fields, including the name of the tag, the date the tag was applied, and whether the tag was applied manually or automatically

B.

Only a single tag can be assigned to an Event.

C.

Events can be tagged automatically if they are similar to known good Events.

D.

Events can be automatically deleted based on tags.

Questions 12

Which of the following statements is true regarding Intrusion Prevention rules?

Options:
A.

Intrusion Prevention rules can block unrecognized software from executing.

B.

Intrusion Prevention rules check for the IP addresses of known malicious senders within a packet

C.

Intrusion Prevention rules can detect or block traffic associated with specific applica-tions, such as Skype or file-sharing utilities.

D.

Intrusion Prevention rules monitor the system for changes to a baseline configuration.

Questions 13

Which Protection Modules can make use of a locally installed Smart Protection Server?

Options:
A.

The Anti-Malware and Web Reputation Protection Modules can make use of the locally installed Smart Protection Server.

B.

All Protection Modules can make use of the locally installed Smart Protection Server

C.

Anti-Malware is the only Protection Modules that can use the locally installed Smart Protection Server.

D.

The Anti-Malware, Web Reputation and Intrusion Prevention Protection Modules can make use of the locally installed Smart Protection Server.

Questions 14

What is the default priority assigned to Firewall rules using the Allow action?

Options:
A.

Firewall rules using the Allow action always have a priority of 4.

B.

Firewall rules using the Allow action can be assigned a priority between 0 and 4.

C.

Firewall rules using the Allow action can be assigned a priority between 1 and 3.

D.

Firewall rules using the Allow action always have a priority of 0.

Questions 15

The details for an event are displayed in the exhibit. Based on these details, which Protection Module generated the event?

Deep-Security-Professional Question 15

Options:
A.

Firewall

B.

Integrity Monitoring

C.

Intrusion Prevention

D.

Application Control

Questions 16

What is IntelliScan?

Options:
A.

IntelliScan is a method of identifying which files are subject to malware scanning as determined from the file content. It uses the file header to verify the true file type.

B.

IntelliScan is a mechanism that improves scanning performance. It recognizes files that have already been scanned based on a digital fingerprint of the file.

C.

IntelliScan reduces the risk of viruses entering your network by blocking real-time compressed executable files and pairs them with other characteristics to improve mal-ware catch rates.

D.

IntelliScan is a malware scanning method that monitors process memory in real time. It can identify known malicious processes and terminate them.

Questions 17

Which of following statements best describes Machine Learning in Deep Security?

Options:
A.

Machine Learning is malware detection technique in which features of an executable file are compared against a cloud-based learning model to determine the probability of the file being malware.

B.

Machine Learning is a malware detection technique in which files are scanned based on the true file type as determined by the file content, not the extension.

C.

Machine Learning is a malware detection technique in which the Deep Security Agent monitors process memory in real time and once a process is deemed to be suspicious, Deep Security will perform additional checks with the Smart Protection Network to determine if this is a known good process.

D.

Machine Learning is malware detection technique in which processes on the protected computer are monitored for actions that are not typically performed by a given process.

Questions 18

What is the effect of the Firewall rule displayed in the following exhibit?

Deep-Security-Professional Question 18

Options:
A.

This rule will allow incoming TCP and UPD communication to this server.

B.

This rule will allow outgoing TCP and UPD communication from this server.

C.

This rule will allow TCP and UPD replies to requests originating on this server.

D.

This rule will allow incoming communication to this server, but not TCP and UPD.

Questions 19

The details of a policy are displayed in the exhibit. Based on these details, which of the following statements is true?

Deep-Security-Professional Question 19

Options:
A.

The credibility scores for visited web sites will be cached. If access to the web site is re-quested again within 30 minutes, its credibility score will be retrieved from the cache instead of the configured Smart Protection source.

B.

Packets failing the Network Packet Sanity Check will still be allowed to pass through the network engine.

C.

Any events generated by computers within your corporate network, as defined by an IP address range, will be ignored

D.

Live packet streams coming through the network engine will be replicated and all traffic analysis will be performed on the replicated stream

Questions 20

Which of the following statements is true regarding the Log Inspection Protection Module?

Options:
A.

Deep Security Agents forward Log Inspection Event details to Deep Security Manager in real time.

B.

Log Inspection can only examine new Events and cannot examine logs entries created before the Protection Module was enabled.

C.

Log Inspection can only examine Deep Security log information.

D.

The Log Inspection Protection Module is supported in both Agent-based and Agentless implementations.

Certification Provider: Trend Micro
Exam Name: Trend Micro Certified Professional for Deep Security Exam
Last Update: Jun 17, 2025
Questions: 80

Trend Micro Free Exams

Trend Micro Free Exams
Get the best free Trend Micro exam study materials and practice tests at Examstrack. Perfect your Trend Micro preparation by visiting Examstrack.