100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Apex One Certified Professional | Exam $7.99   Add to cart

Exam (elaborations)

Apex One Certified Professional | Exam

 6 views  0 purchase
  • Course
  • Institution

Which of the following must be configured before taking advantage of the Unmanaged Endpoints feature in Apex One? ¿Cuál de los siguientes debe configurarse antes de aprovechar la función de puntos finales no administrados en Apex One? The Trace Route Scope must be configured. The Active D...

[Show more]

Preview 3 out of 18  pages

  • January 25, 2023
  • 18
  • 2022/2023
  • Exam (elaborations)
  • Questions & answers
avatar-seller
Apex One Certified Professional | Exam
QUESTIONS: 45 | ATTEMPTS: 3

01:28:38

https://www.coursehero.com/file/55652512/lmsilt-quiz-Apdf/
https://www.coursehero.com/file/p52cr340/Applications-can-be-added-to-a-white-list-to-bypass-
the-New-Encountered/

https://www.coursehero.com/file/p7b0ivt/Which-of-the-following-statements-are-TRUE-
regarding-the-use-of-Endpoint-Sensor/

https://www.coursehero.com/file/p2jepss/The-Apex-One-Edge-Relay-Server-does-not-require-a-
database-The-Apex-One-Edge/

1
Which of the following must be configured before taking advantage of the Unmanaged Endpoints
feature in Apex One?
¿Cuál de los siguientes debe configurarse antes de aprovechar la función de puntos finales no
administrados en Apex One?


The Trace Route Scope must be configured.

The Active Directory/IP Scope must be configured.

The Agent Tree Scope must be configured.

The Port Range Scope must be configured.
2
An Apex One Firewall Policy is created, but not a Firewall Profile. What behavior can you expect for
the Apex One Firewall?
Se crea una Política de Apex One Firewall, pero no un Perfil de Firewall. ¿Qué comportamiento
puede esperar para el Apex One Firewall?


If a Firewall Profile is not created, the policy setting will be applied automatically to
the most recently created profile.

If a Firewall Profile is not created, the policy settings will be applied automatically
to all Security Agents.

If a Firewall Profile is not created, the policy settings will not be applied to the
Security Agents.

If a Firewall Profile is not created, the policy settings will only apply to the local

,computer on which it was created.
3
Which of the following statements regarding the Newly Encountered Programs feature of Behavior
Monitoring is FALSE?
¿Cuál de las siguientes afirmaciones con respecto a la función de Programas recientemente
encontrados de Monitoreo de comportamiento es FALSA?




The Newly Encountered Program feature requires Real-Time Scan and Web
Reputation be enabled.

Behavior Monitoring scans HTTP, HTTPS and email for programs with low
prevalence or maturity.

End users can be prompted to allow programs with low prevalence or maturity.

Applications can be added to a white list to bypass the New Encountered
Programs feature. This will allow programs to execute regardless of their
prevalence and maturity.
4
Which of the following Security Agent deployment methods allows you to select the Scan Mode for
the Agent as part of the setup?
¿Cuál de los siguientes métodos de implementación del Agente de seguridad le permite
seleccionar el Modo de escaneo para el Agente como parte de la configuración?


Web install

Remote install

Logon script

Security Agent Packager
5
Which of the following best describes Assessment Mode in Apex One?
¿Cuál de las siguientes opciones describe mejor el modo de evaluación en Apex One?


Assessment Mode provides a time period where files evaluated by the Security
Agent are submitted to the Predictive Machine Learning model. Submissions
provided while in Assessment Mode train the model to identify potential malware
for your installation of Apex One.

Assessment Mode allows an administrator to evaluate items that Apex One

, detects as spyware/grayware or to monitor Web site access. When Assessment
Mode is enabled, detections are logged only.

Assessment Mode allows administrator to maintain visibility of roaming users even
when they are not using a VPN connection into the corporate network.

Assessment Mode provides a trial period for evaluating Apex One protection
before requiring valid activation codes to be provided.
6
An administrator is responsible for deploying Security Agents on endpoint computers within their
organization. They attempt to download an Apex One Security Agent installation package from Apex
Central and they note that an available Installation Mode option for the Agent is Coexist Mode, as
shown in the exhibit. Which of the following answers best describes Coexist Mode?
Un administrador es responsable de implementar Agentes de seguridad en las
computadoras de punto final dentro de su organización. Intentan descargar un paquete de
instalación de Apex One Security Agent de Apex Central y observan que una opción de
Modo de instalación disponible para el Agente es el Modo Coexistir, como se muestra en la
exposición. ¿Cuál de las siguientes respuestas describe mejor el modo Coexistir?


Coexist Mode allows third-party security products to be used on the endpoint
computer in addition to Apex One. In this mode, Apex One can be used to
supplement security features not provided by the other vendor.

Coexist mode allows third-party security applications to store their event data in
the Apex One Server database. This allows Apex One administrators to view all
events details generated on the endpoint, regardless of the source, from within the
Apex One Web Management console.

Coexist mode allows a Security Agent to be installed on the same computer as the
Apex One Server.

Coexist mode allows multiple Trend Micro Security Agents to be installed on the
same endpoint computer, for example, Apex One can be used for Anti-Malware
and Web Reputation protection and Deep Security can be used for Integrity
Monitoring protection.

7
Which of the following statements is FALSE regarding Apex One heartbeat events?
¿Cuál de las siguientes afirmaciones es FALSA con respecto a los eventos de latidos de Apex
One?


Heartbeats are used to confirm that the connection between the Security Agent
and the Server remains functional.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Academik001. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $7.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

77254 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$7.99
  • (0)
  Add to cart