Deep Security 11 Certified Professional - Exam: Questions: 45 - Attempts: 3
Deep Security 11 Certified Professional - Exam: Questions: 45 - Attempts: 3
Force Allow explicitly allows traffic that matches the Firewall rule to
pass, and implicitly denies all other traffic.
1 of 20 27/06/2019 19:46
https://success.trendmicro.com/LMS/apex/lmsilt__quiz?Id=a9C0B00...
2 of 20 27/06/2019 19:46
https://success.trendmicro.com/LMS/apex/lmsilt__quiz?Id=a9C0B00...
3 of 20 27/06/2019 19:46
https://success.trendmicro.com/LMS/apex/lmsilt__quiz?Id=a9C0B00...
4 of 20 27/06/2019 19:46
https://success.trendmicro.com/LMS/apex/lmsilt__quiz?Id=a9C0B00...
11 When viewing the details for a policy, as displayed in the exhibit, you
notice that the Application Control Protection Module is not available. In
this example, why would this Protection Modules not be available?
5 of 20 27/06/2019 19:46
https://success.trendmicro.com/LMS/apex/lmsilt__quiz?Id=a9C0B00...
VMware NSX
VMware ESXi
VMware vCenter
VMware vRealize
13 Which of the following Firewall rule actions will allow data packets to
pass through the Firewall Protection Module without being subjected to
analysis by the Intrusion Prevention Protection Module?
Deny
Force Allow
Bypass
Allow
6 of 20 27/06/2019 19:46
https://success.trendmicro.com/LMS/apex/lmsilt__quiz?Id=a9C0B00...
The Firewall Protection Module can detect and block Cross Site
Scripting and SQL Injection attacks.
18 Based on the following exhibit, what behavior would you expect for the
Application Control Protection Module
7 of 20 27/06/2019 19:46
https://success.trendmicro.com/LMS/apex/lmsilt__quiz?Id=a9C0B00...
8 of 20 27/06/2019 19:46
https://success.trendmicro.com/LMS/apex/lmsilt__quiz?Id=a9C0B00...
9 of 20 27/06/2019 19:46
https://success.trendmicro.com/LMS/apex/lmsilt__quiz?Id=a9C0B00...
10 of 20 27/06/2019 19:46
https://success.trendmicro.com/LMS/apex/lmsilt__quiz?Id=a9C0B00...
11 of 20 27/06/2019 19:46
https://success.trendmicro.com/LMS/apex/lmsilt__quiz?Id=a9C0B00...
26 What is IntelliScan?
12 of 20 27/06/2019 19:46
https://success.trendmicro.com/LMS/apex/lmsilt__quiz?Id=a9C0B00...
29 The details for an event are displayed in the exhibit. Based on these
details, which Protection Module generated the event?
Log Inspection
Firewall
Integrity Monitoring
Intrusion Prevention
13 of 20 27/06/2019 19:46
https://success.trendmicro.com/LMS/apex/lmsilt__quiz?Id=a9C0B00...
The rules displayed in the exhibit have been assigned to the policy
at the parent level. Rules assigned to a parent policy can not be
unassigned at the child level.
32 What is the default priority assigned to Firewall rules using the Allow
action?
14 of 20 27/06/2019 19:46
https://success.trendmicro.com/LMS/apex/lmsilt__quiz?Id=a9C0B00...
15 of 20 27/06/2019 19:46
https://success.trendmicro.com/LMS/apex/lmsilt__quiz?Id=a9C0B00...
36 New servers are added to the Computers list in Deep Security Manager
Web config by running a Discover operation. What behavior can you
expect for newly discovered computers?
Any servers within the IP address range that are hosting Deep
Security Agents will be added to the Computers list and will be
automatically activated.
16 of 20 27/06/2019 19:46
https://success.trendmicro.com/LMS/apex/lmsilt__quiz?Id=a9C0B00...
17 of 20 27/06/2019 19:46
https://success.trendmicro.com/LMS/apex/lmsilt__quiz?Id=a9C0B00...
41 The details for an event are displayed in the exhibit. Based on these
details, which Protection Module generated the event?
Web Reputation
Integrity Monitoring
Intrusion Prevention
Firewall
18 of 20 27/06/2019 19:46
https://success.trendmicro.com/LMS/apex/lmsilt__quiz?Id=a9C0B00...
43 The maximum disk space limit for the Identified Files folder is reached.
What is the expected Deep Security Agent behavior in this scenario?
Deep Security Agents will delete the oldest files in this folder until
20% of the allocated space is available.
Deep Security Agents will delete any files that have been in the
folder for more than 60 days.
Any existing files are in the folder are compressed and forwarded
to Deep Security Manager to free up disk space.
44 Which of the following correctly identifies the order of the steps used by
the Web Reputation Protection Module to determine if access to a web
site should be allowed?
19 of 20 27/06/2019 19:46
https://success.trendmicro.com/LMS/apex/lmsilt__quiz?Id=a9C0B00...
45 How can you prevent a file from being scanned for malware ?
OK
20 of 20 27/06/2019 19:46