Which of the following statements regarding Predictive Machine Learning is FALSE?
Predictive Machine Learning analyzes files downloaded from the Internet through http or https.
Predictive Machine Learning analyzes file
...
Which of the following statements regarding Predictive Machine Learning is FALSE?
Predictive Machine Learning analyzes files downloaded from the Internet through http or https.
Predictive Machine Learning analyzes files downloaded from the Internet through http only.
Predictive Machine Learning analyzes files accessed from USB.
Predictive Machine Learning analyzes files downloaded through email.
1
The Apex One Security Agent icon in the Windows System Tray displays with the icon displayed in the exhibit.
Which of the following answers describes the state of the Agent? Select all that apply.
The Security Agent does not have a connection to the Apex One Server.
The Real-time Scan service on the Security Agent is not running.
The Security Agent has a connection to the Apex One Server.
The Security Agent does not have access to a Smart Protection source.
An administrator is responsible for deploying Security Agents on endpoint computers within their organization. They
attempt to download an Apex One Security Agent installation package from Apex Central and they note that an
available Installation Mode option for the Agent is Coexist Mode, as shown in the exhibit. Which of the following
answers best describes Coexist Mode?
Coexist Mode allows third-party security products to be used on the endpoint computer in addition to Apex One.
In this mode, Apex One can be used to supplement security features not provided by the other vendor.
Coexist mode allows a Security Agent to be installed on the same computer as the Apex One Server.
Coexist mode allows multiple Trend Micro Security Agents to be installed on the same endpoint computer, for
example, Apex One can be used for Anti-Malware and Web Reputation protection and Deep Security can be used
for Integrity Monitoring protection.
Coexist mode allows third-party security applications to store their event data in the Apex One Server database.
This allows Apex One administrators to view all events details generated on the endpoint, regardless of the source,
from within the Apex One Web Management console.
3
4 What is the purpose of the Vulnerability Protection Pattern in Apex One, as displayed in the exhibit? The Vulnerability Protection Pattern contains a local version of the Predictive Machine Learning model used in
situations where an endpoint computer does not have Internet connectivity.
The Vulnerability Protection Pattern contains the Intrusion Prevention Rules recommended by Trend Micro to
provide protection from common vulnerabilities in applications installed on the endpoint computer.
The Vulnerability Protection Pattern contains the result of a recommendation scan that was run on the endpoint
computer to identify potential vulnerabilities in the operating system and applications installed on the endpoint
computer.
The Vulnerability Protection Pattern contains the Intrusion Prevention Rules recommended by Trend Micro to
provide protection from operating system vulnerabilities.
How is debug mode enabled on a Security Agent?
Create an ofcdebug.ini file on the Security Agent computer and identify the required debug level.
Click the letter A in the Apex One Web Management console title bar to display the Debug Log Settings window.
Within the Security Agent console, click Help, click the Diagnostic Toolkit tab and click Debug Log.
Edit the ofcscan.ini file on the Security Agent and enable the required debug level.
5
The settings for an endpoint computer enables pre-execution Predictive Machine Learning using the Apex One
Security Agent. The computer, however, does not have an Internet connection to submit the file features to theMachine Learning model on the Smart Protection Network. How can this endpoint benefit from Machine Learning
scans when it can not reach the Internet? Select all that apply.
Predictive Machine Learning requires a connection to the Internet to function. Without an Internet connection on
the endpoint, this type of scan is skipped.
The environment can be configured so that Machine Learning requests are performed through a local Smart
Protection Server on the network. In this scenario, the Smart Protection Server proxies to submission of the file
features to the Smart Protection Network.
Predictive Machine Learning scans can performed by a local Smart Protection Server. The Smart Protection
Server updates its version of the Machine Learning Model regularly to ensure it is always up to date.
The endpoint has access to a Predictive Machine Learning Local File Model which allows pre-execution
Predictive Machine Learning scans to be performed locally when there is no Internet connection.
Target endpoints receiving policy settings through Apex Central can be identified using Filter by Criteria or Specify
Agent(s) as displayed in the exhibit. Which of the following statement are TRUE regarding these two options? Select
all that apply.
When identifying target endpoints using Filter by Criteria, if the matching characteristics of the endpoints change
over time, a different policy may be deployed to the endpoint.
Assigning policies using Filter by Criteria allows policies to be deployed to endpoints across multiple domains.
When a policy is assigned to endpoints using Specify Target, the assigned policy will never change or be reevaluated.
Policies targeted to endpoints using Specify Target will always take precedence of policies targeted using Filter
by Criteria.
[Show More]