Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Apex One Certified Professional Exam Questions and Answers 2024, Exams of Advanced Education

Apex One Certified Professional Exam Questions and Answers 2024

Typology: Exams

2023/2024

Available from 08/17/2024

LectDavid
LectDavid 🇬🇧

3

(4)

1.3K documents

1 / 37

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Apex One Certified Professional
Exam Questions and Answers 2024
1 What are some of the limitations of a Security Agent
running in Independent Mode? Select all that apply.
The Security Agent does not initiate scan commands from
the Apex One Server.
The Security Agent does not accept policy settings from
the Apex One Server.
The Security Agent does not run real-time
scans. The Security Agent denies access to
shared folders.
2 Which of the following items is NOT required to enable
Browser Exploit Protection?
Advanced Protection
Service Behavior
Monitoring
Web Reputation
Relevant browser plug-in installed
3 Which of the following is NOT a valid Outbreak Prevention
Policy option that can be configured by an administrator?
Block Ports
Deny access to executable compressed
files Limit/Deny access to shared folders
Limit/Deny access to mapped networked drives
4 Which of the following best describes Assessment Mode in Apex One?
Assessment Mode provides a trial period for evaluating
Apex One protection before requiring valid activation codes to
be provided.
Assessment Mode allows administrator to maintain
visibility of roaming users even when they are not using a VPN
connection into the corporate network.
Assessment Mode allows an administrator to evaluate
items that Apex One detects as spyware/grayware or to
monitor Web site access. When Assessment Mode is enabled,
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19
pf1a
pf1b
pf1c
pf1d
pf1e
pf1f
pf20
pf21
pf22
pf23
pf24
pf25

Partial preview of the text

Download Apex One Certified Professional Exam Questions and Answers 2024 and more Exams Advanced Education in PDF only on Docsity!

Apex One Certified Professional

Exam Questions and Answers 2024

1 What are some of the limitations of a Security Agent

running in Independent Mode? Select all that apply.

The Security Agent does not initiate scan commands from the Apex One Server. The Security Agent does not accept policy settings from the Apex One Server. The Security Agent does not run real-time scans. The Security Agent denies access to shared folders.

2 Which of the following items is NOT required to enable

Browser Exploit Protection?

Advanced Protection Service Behavior Monitoring Web Reputation Relevant browser plug-in installed

3 Which of the following is NOT a valid Outbreak Prevention

Policy option that can be configured by an administrator?

Block Ports Deny access to executable compressed files Limit/Deny access to shared folders Limit/Deny access to mapped networked drives

4 Which of the following best describes Assessment Mode in Apex One?

Assessment Mode provides a trial period for evaluating Apex One protection before requiring valid activation codes to be provided. Assessment Mode allows administrator to maintain visibility of roaming users even when they are not using a VPN connection into the corporate network. Assessment Mode allows an administrator to evaluate items that Apex One detects as spyware/grayware or to monitor Web site access. When Assessment Mode is enabled,

detections are logged only. Assessment Mode provides a time period where files evaluated by

The port assignment is read from an Apex Central configuration file. A high-numbered port is randomly assigned. The Setup Wizard does not assign the port; you must type a port number manually. The Setup Wizard scans ports on the Apex One Server and selects a port that is not being used.

9 By default, how many incremental pattern updates does the

Apex One Server make available to the Security Agents?

10 Which of the following statements are TRUE regarding Lockdown

Mode in Apex One Application Control policies? Select all that

apply.

When in Lockdown Mode, Apex One blocks all applications not identified during an inventory scan. Applications from trusted vendors can be excluded from Lockdown. When in Lockdown Mode, the endpoint does not permit access to any application that do not specifically match Allow criteria. When in Lockdown Mode, assessment mode is automatically disabled.

11 A new IP Address Grouping is configured as in the exhibit. The

new grouping called Lab is created, but when checking the

Agent List, no Agents are displayed in the group even though

Agents do exist within the IP address range. Which of the

following events will trigger the addition of the Agents to the

group? Select all that apply.

Microsoft Outlook USB Selected Web browsers

14 An Apex One Firewall Policy is created, but not a Firewall

Profile. What behavior can you expect for the Apex One

Firewall?

If a Firewall Profile is not created, the policy settings will only apply to the local computer on which it was created. If a Firewall Profile is not created, the policy setting will be applied automatically to the most recently created profile. If a Firewall Profile is not created, the policy settings will not be applied to the Security Agents. If a Firewall Profile is not created, the policy settings will be applied automatically to all Security Agents.

If a Firewall Profile is not created, the policy settings will not be applied to any Security Agents

15 Which of the following statements regarding the Newly

Encountered Programs feature of Behavior Monitoring is

FALSE?

The Newly Encountered Program feature requires Real- Time Scan and Web Reputation be enabled. Behavior Monitoring scans HTTP, HTTPS and email for programs with low prevalence or maturity. Applications can be added to a white list to bypass the New Encountered Programs feature. This will allow programs to execute regardless of their prevalence and maturity. End users can be prompted to allow programs with low prevalence or maturity.

16 Which of the following correctly describes the method of

deploying an Apex One Edge Relay Server?

Click "Enable Apex One Edge Relay Server" under the Administration Settings in the Apex One Web Management console. From the target server, run the Edge Relay Server setup application obtained from the Apex One Server. Click "Enable Apex One Edge Relay Server" during the Apex One Setup Wizard. Run the Edge Relay Server setup application on the Apex One Server and specify the IP address of the target server when prompted.

Which of the following services is always running on an Apex One

Server, regardless of the options selected during setup?

Trend Micro Web Classification Service Real-time Scan Service Apex One Master Service Trend Micro File Reputation Service

18 When Smart Feedback is enabled on Apex One Server, where

does the Security Agent send the information?

It is sent to the Site Safety Center. It is sent to the Smart Feedback Server. It is sent to a Smart Protection Server. It is sent to the Smart Protection Network.

19 Which of the following must be configured before taking

advantage of the Unmanaged Endpoints feature in Apex One?

The Port Range Scope must be configured. The Agent Tree Scope must be configured. The Trace Route Scope must be configured. The Active Directory/IP Scope must be configured.

20 An Apex One administrator is defined using their Active

Directory account for authentication. The administrator forgets

their password. How can the administrator reset their password

in Apex One?

The administrator should edit the password entry in the TrendAuth.xml file. The administrator should edit the password entry in the TrendAuthDef.xml file The Active Directory password cannot be reset through Apex One. The administrator should edit the password entry in the Ofcserver.ini file.

21 A Security Agent belongs to a domain with exclusions added to

its Real- time Scan Settings. Where on the Security Agent

could you view these exclusions?

The exclusions can be viewed in the ofcscan.ini file.

A Security Agent installation package is created using the Agent

Packager utility. In environments with multiple Apex One Servers,

how do you specify which of these Servers the Agents installed

using the package will report back to?

When the Security Agent installation package is run on the endpoint computer, the user will be prompted to identify the Server to which it will report. The Agent Packager utility interface includes a field to identify the hostname of the Server that Agents installed using the package will report to. Security Agents installed using the Agent package report back to the Server on which the package was created. There is no need to identify which Server the Agent will report to as all the Apex One Servers share a single database.

26 Which of the following is NOT a valid method for removing the

Security Agent from an endpoint computer?

Using the Agent Mover Tool (IpXfer.exe) to move the Agent to another endpoint computer Running the Security Agent Uninstall Program Uninstalling the Security Agent through the Apex One Web Management console Manually uninstalling the services, files and registry information

27 What is the purpose of the Vulnerability Protection Pattern in

Apex One, as displayed in the exhibit?

The Vulnerability Protection Pattern contains a local version of the Predictive Machine Learning model used in situations where an endpoint computer does not have Internet connectivity. The Vulnerability Protection Pattern contains the Intrusion Prevention Rules recommended by Trend Micro to provide protection from operating system vulnerabilities. The Vulnerability Protection Pattern contains the Intrusion

By MAC address

By Security Agent version By IP address

35 Web Reputation is configured to block a specific URL. In which

log file is a corresponding entry added?

OfcUrlf.log Fileblocked.log Cache.dat Blockedurl.log

36 What are the two priority modes available for Vulnerability

Protection in Apex One? Select all that apply.

Exploit priority Performance priority Security priority Policy priority

37 Which of the following Apex One Server components can you

install as part of the setup process?

Apex One (Mac) An Integrated Smart Protection Server The Apex One Edge Relay Server Apex One Data Protection

38 Which of the following statements regarding the Apex One

Firewall is TRUE?

The Apex One Firewall can only be enabled/disabled on Agents at the domain level in the Agent tree. The Apex One Firewall can be enabled/disabled on Agents at any level in the Agent Tree. The Apex One Firewall can only be enabled/disabled on Agents at the global level in the Agent tree. The Apex One Firewall can only be enabled/disabled on Agents at the Security Agent level in the Agent tree.

39 The root administrator has forgotten their password for the Apex

One Web Management console before any other administrators

have been created. How can the root administrator create a new

password?