Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

Deep-Security-Professional Trend Micro Certified Professional for Deep Security Exam Questions and Answers

Questions 4

Which of the following Firewall rule actions will allow data packets to pass through the Firewall Protection Module without being subjected to analysis by the Intrusion Prevention Protection Module?

Options:

A.

Deny

B.

Bypass

C.

Allow

D.

Force Allow

Buy Now
Questions 5

As the administrator in a multi-tenant environment, you would like to monitor the usage of security services by tenants? Which of the following are valid methods for monitoring the usage of the system by the tenants?

Options:

A.

Generate a Chargeback report in Deep Security manager Web console.

B.

All the choices listed here are valid.

C.

Use the Representational State Transfer (REST) API to collect usage data from the tenants.

D.

Monitor usage by the tenants from the Statistics tab in the tenant Properties window.

Buy Now
Questions 6

Which of the following statements is true regarding software inventories used as part of the Application Control Protection Module?

Options:

A.

Disable the Application Control Protection Module when installing software upgrades, otherwise, the new software will be prevented from installing.

B.

An administrator can view the list of allowed of software in the inventory from the De-tails tab for each individual Computer.

C.

An administrator can share the inventory of allowed software with other computers protected by Deep Security Agents, by copying the inventory database file (ac.db) from the source computer.

D.

When an administrator allows software that would be otherwise blocked by the En-forcement Mode, it isn't added to the inventory of approved software. Instead, it is added to that computer's white list.

Buy Now
Questions 7

Which of the following is not an operation that is performed when network traffic is intercepted by the network driver on the Deep Security Agent?

Options:

A.

Analyze the packet within the context of traffic history and connection state.

B.

Compare the data in the packet against the Anti-Malware Scan Configuration to verify whether any of the data related to files and folders on the Exclusion list.

C.

Verify the integrity of the packet to insure the packet is suitable for analysis.

D.

Verify the packet is not part of a reconnaissance scan used to discover weaknesses on the Deep Security Agent host computer.

Buy Now
Questions 8

What is the purpose of the Deep Security Notifier?

Options:

A.

The Deep Security Notifier is a application in the Windows System Tray that displays the Status of Deep Security Manager during policy and software updates.

B.

The Deep Security Notifier is a server components that collects log entries from man-aged computers for delivery to a configured SIEM device.

C.

The Deep Security Notifier is a server component used in agentless configurations to allow Deep Security Manager to notify managed computers of pending updates.

D.

The Deep Security Notifier is a application in the Windows System Tray that com-municates the state of Deep Security Agents and Relays to endpoint computers.

Buy Now
Questions 9

What is the purpose of the Deep Security Relay?

Options:

A.

Deep Security Relays distribute load to the Deep Security Manager nodes in a high-availability implementation.

B.

Deep Security Relays forward policy details to Deep Security Agents and Virtual Ap-pliances immediately after changes to the policy are applied.

C.

Deep Security Relays maintain the caches of policies applied to Deep Security Agents on protected computers to improve performance.

D.

Deep Security Relays are responsible for retrieving security and software updates and distributing them to Deep Security Manager, Agents and Virtual Appliances.

Buy Now
Questions 10

Which of the following statements is FALSE regarding Firewall rules using the Bypass action?

Options:

A.

Applying a Firewall rule using the Bypass action to traffic in one direction automatically applies the same action to traffic in the other direction.

B.

Firewall rules using the Bypass action do not generate log events.

C.

Firewall rules using the Bypass action allow incoming traffic to skip both Firewall and Intrusion Prevention analysis.

D.

Firewall rules using the Bypass action can be optimized, allowing traffic to flow as effi-ciently as if a Deep Security Agent was not there.

Buy Now
Questions 11

Which of the following statements is true regarding Intrusion Prevention protection?

Options:

A.

Intrusion Prevention protection can drop malicious packets but cannot reset the con-nection.

B.

Intrusion Prevention protection only works in conjunction with the Anti-Malware Pro-tection Module.

C.

Intrusion Prevention protection can only work on computers where a Deep Security Agent is installed; agentless protection is not supported.

D.

Intrusion Prevention protection can drop or reset a connection.

Buy Now
Questions 12

Which of the following statements correctly describes Smart Folders?

Options:

A.

Smart Folders identify the folders that will be scanned when a Real-Time, Manual or Scheduled malware scan is run.

B.

Smart Folders are a collection of subfolders containing the policy settings that are ap-plied to child policies or directly to Computers.

C.

Smart Folders act as a saved search of computers which is executed each time the folder is clicked to display its contents.

D.

Smart Folders are the containers used to store the results of Recommendation Scans. Once a Recommendation Scan has completed, and administrator can click a Smart Folder and select which of the recommended rules to apply.

Buy Now
Exam Name: Trend Micro Certified Professional for Deep Security Exam
Last Update: Oct 15, 2025
Questions: 73

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99