Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Deep-Security-Professional Exam Dumps - Trend Micro Certified Professional for Deep Security Exam

Go to page:
Question # 9

New servers are added to the Computers list in Deep Security Manager Web config by running a Discover operation. What behavior can you expect for newly discovered computers?

A.

Any servers discovered in the selected Active Directory branch hosting a Deep Security Agent will be added to the Computers list.

B.

Any servers within the IP address range hosting a Deep Security Agent will be added to the Computers list.

C.

Any servers within the IP address range that are hosting Deep Security Agents will be added to the Computers list and will be automatically activated.

D.

Any servers within the IP address range will be added to the Computers list, regardless of whether they are hosting a Deep Security Agent or not.

Full Access
Question # 10

Which of the following statements is true regarding the Log Inspection Protection Module?

A.

Deep Security Agents forward Log Inspection Event details to Deep Security Manager in real time.

B.

Log Inspection can only examine new Events and cannot examine logs entries created before the Protection Module was enabled.

C.

Log Inspection can only examine Deep Security log information.

D.

The Log Inspection Protection Module is supported in both Agent-based and Agentless implementations.

Full Access
Question # 11

What is the purpose of the Deep Security Relay?

A.

Deep Security Relays distribute load to the Deep Security Manager nodes in a high-availability implementation.

B.

Deep Security Relays forward policy details to Deep Security Agents and Virtual Ap-pliances immediately after changes to the policy are applied.

C.

Deep Security Relays maintain the caches of policies applied to Deep Security Agents on protected computers to improve performance.

D.

Deep Security Relays are responsible for retrieving security and software updates and distributing them to Deep Security Manager, Agents and Virtual Appliances.

Full Access
Question # 12

What is IntelliScan?

A.

IntelliScan is a method of identifying which files are subject to malware scanning as determined from the file content. It uses the file header to verify the true file type.

B.

IntelliScan is a mechanism that improves scanning performance. It recognizes files that have already been scanned based on a digital fingerprint of the file.

C.

IntelliScan reduces the risk of viruses entering your network by blocking real-time compressed executable files and pairs them with other characteristics to improve mal-ware catch rates.

D.

IntelliScan is a malware scanning method that monitors process memory in real time. It can identify known malicious processes and terminate them.

Full Access
Go to page: