Trend Micro Deep-Security-Professional - Trend Micro Certified Professional for Deep Security Exam
Total 80 questions
Which of the following statements is false regarding the Log Inspection Protection Module?
The maximum disk space limit for the Identified Files folder is reached. What is the expected Deep Security Agent behavior in this scenario?
The Firewall Protection Module is enabled on a server through the computer details. What is default behavior of the Firewall if no rules are yet applied?
Which of the following statements is true regarding Intrusion Prevention protection?
Your organization stores PDF and Microsoft Office files within the SAP Netweaver platform and requires these documents to be scanned for malware. Which Deep Security component is required to satisfy this requirement?
An administrator attempts to activate the Deep Security Agent installed on a server by typing the following command in the Command Prompt on the Deep Security Agent computer:
dsa_control -a dsm://server1.acme.com:4120
The Agent does not activate as expected. What is a valid reason for this issue?
Where does Deep Security Manager store the credentials it uses to access the database?
Which of the following operations makes use of the Intrusion Prevention Protection Module?
Which of the following VMware components is not required to enable agentless protection using Deep Security.
Multiple Application Control Events are being displayed in Deep Security after a series of ap-plication updates and the administrator would like to reset Application Control. How can this be done?