Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

apex_one_certified_professional_exam_, Exams of Information Technology

Questions and answers related to the Apex One Certified Professional exam. It covers topics such as configuring the Unmanaged Endpoints feature, Firewall Policy and Profile, Newly Encountered Programs feature of Behavior Monitoring, Security Agent deployment methods, Assessment Mode, and more. useful for those preparing for the Apex One Certified Professional exam or those interested in learning about Apex One security features.

Typology: Exams

2023/2024

Available from 09/29/2023

TOPGradeBooster.
TOPGradeBooster. 🇺🇸

3.4

(34)

2.5K documents

1 / 18

Toggle sidebar

Partial preview of the text

Download apex_one_certified_professional_exam_ and more Exams Information Technology in PDF only on Docsity! 1 Apex One Certified Professional | Exam Questions and Answers 2023 1 Which of the following must be configured before taking advantage of the Unmanaged Endpoints feature in Apex One? ¿Cuál de los siguientes debe configurarse antes de aprovechar la función de puntos finales no administrados en Apex One? The Trace Route Scope must be configured. The Active Directory/IP Scope must be configured. The Agent Tree Scope must be configured. The Port Range Scope must be configured. 2 An Apex One Firewall Policy is created, but not a Firewall Profile. What behavior can you expect for the Apex One Firewall? Se crea una Política de Apex One Firewall, pero no un Perfil de Firewall. ¿Qué comportamiento puede esperar para el Apex One Firewall? If a Firewall Profile is not created, the policy setting will be applied automatically to the most recently created profile. If a Firewall Profile is not created, the policy settings will be applied automatically to all Security Agents. If a Firewall Profile is not created, the policy settings will not be applied to the Security Agents. If a Firewall Profile is not created, the policy settings will only apply to the local 2 computer on which it was created. 3 Which of the following statements regarding the Newly Encountered Programs feature of Behavior Monitoring is FALSE? ¿Cuál de las siguientes afirmaciones con respecto a la función de Programas recientemente encontrados de Monitoreo de comportamiento es FALSA? The Newly Encountered Program feature requires Real-Time Scan and Web Reputation be enabled. Behavior Monitoring scans HTTP, HTTPS and email for programs with low prevalence or maturity. End users can be prompted to allow programs with low prevalence or maturity. Applications can be added to a white list to bypass the New Encountered Programs feature. This will allow programs to execute regardless of their prevalence and maturity. 4 Which of the following Security Agent deployment methods allows you to select the Scan Mode for the Agent as part of the setup? ¿Cuál de los siguientes métodos de implementación del Agente de seguridad le permite seleccionar el Modo de escaneo para el Agente como parte de la configuración? Web install Remote install Logon script Security Agent Packager 5 Which of the following best describes Assessment Mode in Apex One? ¿Cuál de las siguientes opciones describe mejor el modo de evaluación en Apex One? Assessment Mode provides a time period where files evaluated by the Security Agent are submitted to the Predictive Machine Learning model. Submissions provided while in Assessment Mode train the model to identify potential malware for your installation of Apex One. Assessment Mode allows an administrator to evaluate items that Apex One 5 Apex One can query Active Directory to identify endpoint using third-party security software and target them for uninstallation. Active Directory can be used to automatically group agents based on an Active Directory domain and map them to domains in the Apex One Security Agent tree. 10 Which of the following correctly describes the method of deploying an Apex One Edge Relay Server? From the target server, run the Edge Relay Server setup application obtained from the Apex One Server. Run the Edge Relay Server setup application on the Apex One Server and specify the IP address of the target server when prompted. Click "Enable Apex One Edge Relay Server" under the Administration Settings in the Apex One Web Management console. Click "Enable Apex One Edge Relay Server" during the Apex One Setup Wizard. 11 An Apex One administrator is defined using their Active Directory account for authentication. The administrator forgets their password. How can the administrator reset their password in Apex One? Un administrador de Apex One se define utilizando su cuenta de Active Directory para la autenticación. El administrador olvida su contraseña. ¿Cómo puede el administrador restablecer su contraseña en Apex One? The administrator should edit the password entry in the Ofcserver.ini file. The administrator should edit the password entry in the TrendAuth.xml file. The Active Directory password cannot be reset through Apex One. The administrator should edit the password entry in the TrendAuthDef.xml file 12 A new IP Address Grouping is configured as in the exhibit. The new grouping called Lab is created, but when checking the Agent List, no Agents are displayed in the group even though Agents do exist within the IP address range. Which of the following events will trigger the addition of the Agents to the group? Select all that apply. Una nueva agrupación de direcciones IP se configura como en la exposición. Se crea la nueva agrupación llamada Lab, pero cuando se verifica la Lista de agentes, no se muestran agentes en el grupo a pesar de que existen agentes dentro del rango de direcciones IP. ¿Cuál de los siguientes eventos activará la adición de los Agentes al grupo? Seleccione todas las que correspondan. 6 Agents will be added to the group when their connection status changes from offline to online. Agents will be added to the group when the administrator runs the Sort Client operation. Agents will be added to the group when they register to the Server for the first time. Agents must be added to the group manually. 13 Which of the following items is NOT required to enable Browser Exploit Protection? Relevant browser plug-in installed Behavior Monitoring Web Reputation Advanced Protection Service 14 A Security Agent installation package is created using the Agent Packager utility. In environments with multiple Apex One Servers, how do you specify which of these Servers the Agents installed using the package will report back to? Se crea un paquete de instalación de Security Agent utilizando la utilidad Agent Packager. En entornos con múltiples servidores Apex One, ¿cómo se especifica a cuál de estos servidores informarán los agentes instalados utilizando el paquete? Security Agents installed using the Agent package report back to the Server on which the package was created. There is no need to identify which Server the Agent will report to as all the Apex One Servers share a single database. When the Security Agent installation package is run on the endpoint computer, the user will be prompted to identify the Server to which it will report. The Agent Packager utility interface includes a field to identify the hostname of the Server that Agents installed using the package will report to. 15 7 The settings for an endpoint computer enables pre-execution Predictive Machine Learning using the Apex One Security Agent. The computer, however, does not have an Internet connection to submit the file features to the Machine Learning model on the Smart Protection Network. How can this endpoint benefit from Machine Learning scans when it can not reach the Internet? Select all that apply. La configuración de una computadora de punto final permite el aprendizaje automático predictivo previo a la ejecución con el agente de seguridad Apex One. Sin embargo, la computadora no tiene una conexión a Internet para enviar las características del archivo al modelo de Machine Learning en la Red de Protección Inteligente. ¿Cómo puede este punto final beneficiarse de los escaneos de Machine Learning cuando no puede llegar a Internet? Seleccione todas las que correspondan. Predictive Machine Learning requires a connection to the Internet to function. Without an Internet connection on the endpoint, this type of scan is skipped. The endpoint has access to a Predictive Machine Learning Local File Model which allows pre-execution Predictive Machine Learning scans to be performed locally when there is no Internet connection. Predictive Machine Learning scans can performed by a local Smart Protection Server. The Smart Protection Server updates its version of the Machine Learning Model regularly to ensure it is always up to date. The environment can be configured so that Machine Learning requests are performed through a local Smart Protection Server on the network. In this scenario, the Smart Protection Server proxies to submission of the file features to the Smart Protection Network. 16 Security Agents can be grouped automatically by which of the following methods? By Active Directory domain By operating system version By Security Agent version By MAC address 17 Which of the following is a valid method for moving a registered Security Agent to a different Apex One Server? Run the Apex One Update Agent utility and identify the details of the new Apex One Server. Open the Security Agent console and specify the new Apex One Server location. 10 Exploit priority 23 Which of the following statements are TRUE regarding the Apex One Edge Relay Server? Select all that apply. The Apex One Edge Relay Server installs its own Codebase database. The Apex One Edge Relay Server requires the Internet Information Server. The Apex One Edge Relay Server does not require a database. The Apex One Edge Relay Server requires an SQL Server database to function. 24 Which of the following statements regarding the Apex One Firewall is TRUE? Page 233 The Apex One Firewall can be enabled/disabled on Agents at any level in the Agent Tree. The Apex One Firewall can only be enabled/disabled on Agents at the global level in the Agent tree. The Apex One Firewall can only be enabled/disabled on Agents at the Security Agent level in the Agent tree. The Apex One Firewall can only be enabled/disabled on Agents at the domain level in the Agent tree. 25 In which of the following locations would you NOT install an Update Agent? At remote sites On the Apex One Server On VLANs On branch network segments 26 11 Which of the following Apex One Server components can you install as part of the setup process? Page 28 Apex One (Mac) Apex One Data Protection An Integrated Smart Protection Server The Apex One Edge Relay Server 27 Which of the following is NOT a valid method for removing the Security Agent from an endpoint computer? Page 99. Uninstalling the Security Agent through the Apex One Web Management console Running the Security Agent Uninstall Program Using the Agent Mover Tool (IpXfer.exe) to move the Agent to another endpoint computer Manually uninstalling the services, files and registry information 28 Which of the following statements describes a valid use for the Smart Protection Service Proxy setting displayed in the exhibit? When this setting is enabled, Machine Learning requests by remote Security Agents are proxied to the Smart Protection Server through the Edge Relay Server. This allows endpoint computers outside of the network to enable Predictive Machine Learning checks. When this setting is enabled, Smart Scan becomes available in addition to conventional scanning. This allows endpoint computers to access a cloud-based repository of malware information on the Smart Protection Network. When this setting is enabled, Security Agents are able to access the Internet 12 through a Web proxy. When this setting is enabled, Machine Learning requests are proxied through the Smart Protection Server. This allows endpoint computers with unreliable Internet connections to enable Predictive Machine Learning checks. 29 Which of the following is NOT a task performed by the Apex One Server? PAGE 17 apex one server task Distributes protection settings to Security Agents. Collects suspicious file samples and forwards for analysis. Installs Security Agents. Extracts characteristics from files and submits to the Smart Protection network for heuristic analysis. 30 What is the effect of the Update Source configuration displayed in the exhibit? All Security Agents installed on endpoint computers with an IP address between 192.168.4.1 and 192.168.4.254 will retrieve their updates from the Security Agent on the client-03 computer. All the endpoint computers with an IP address between 192.168.4.1 and 192.168.4.254 will use the standard update source to retrieve updates. The client-03 computer will retrieve its updates from any Security Agent within the 192.168.4.1 and 192.168.4.254 range. The Security Agent on client-03 will be updated the next time it connects to the Apex One Server. 31 Event Monitoring is enabled in the Behavior Monitoring settings to protect endpoint computers from a variety of unauthorized software and malware attacks. Which of the following is NOT an action that can be configured for applications generating the events? 15 Which of the following statements are TRUE regarding the use of Endpoint Sensor with Apex One? Select all that apply. PAGE 324 Endpoint Sensor provides the ability to investigate both the historical and current state of a managed endpoint. Endpoint Sensor records metadata related to activities occurring on the endpoint computer. This data is forwarded to Apex One on a regular basis for storage in the database. Policies using Endpoint Sensor must be deployed from Apex Central. A separate Endpoint Sensor Agent must be installed on the endpoint computer. 38 Which of the following is the correct sequence of events when malware samples are submitted to Deep Discover Analyzer by a Security Agent? PAGE 293 1. The Security Agent sends the malware sample to Apex Central. 2. Apex Central forwards the sample to Deep Discovery Analyzer for analysis. 3. After analysis, the Deep Discovery Analyzer sends the results to Apex Central. 4. Apex Central forwards the Suspicious Objects List to the Apex One Server. 1. The Security Agent sends the malware sample to the Apex One Server. 2. The Apex One Server forwards the sample to Apex Central. 3. Apex Central sends it to Deep Discovery Analyzer for analysis. 4. After analysis, the Deep Discovery Analyzer sends the results to Apex Central. 5. Apex Central forwards the Suspicious Objects List to the Apex One Server. 1. The Security Agent sends the malware sample to the Apex One Server. 2. The Apex One Server forwards the malware sample to Deep Discovery Analyzer for analysis. 3. After analysis, the Deep Discovery Analyzer sends the results to Apex Central. 4. Apex Central forwards the Suspicious Objects List to the Apex One Server. 1. The Security Agent sends the malware sample to Deep Discovery Analyzer for analysis. 2. After analysis, the Deep Discovery Analyzer sends the results to Apex Central. 3. Apex Central forwards the Suspicious Objects List to the Apex One Server. 39 The root administrator has forgotten their password for the Apex One Web Management console before any other administrators have been created. How can the root administrator create a new password? Page 71, password reset tool. The svrsvcsetup utility can be used to update the root administrator password. 16 The Windows Administrator credentials must be provided as part of the command syntax. The root administrator can update their password through the TrendAuth.xml file. The root administrator can run the reset password tool and provide their Windows Administrator credentials when prompted. Once logged in, they can create a new password. The root administrator can update their password through the ofcserver.ini file. 40 Target endpoints receiving policy settings through Apex Central can be identified using Filter by Criteria or Specify Agent(s) as displayed in the exhibit. Which of the following statement are TRUE regarding these two options? Select all that apply. Los puntos finales de destino que reciben configuraciones de políticas a través de Apex Central se pueden identificar utilizando Filtrar por criterios o Especificar agente (s) como se muestra en la exposición. ¿Cuál de las siguientes afirmaciones es VERDADERA con respecto a estas dos opciones? Seleccione todas las que correspondan. Page 272 When a policy is assigned to endpoints using Specify Target, the assigned policy will never change or be re-evaluated. Policies targeted to endpoints using Specify Target will always take precedence of policies targeted using Filter by Criteria. When identifying target endpoints using Filter by Criteria, if the matching characteristics of the endpoints change over time, a different policy may be deployed to the endpoint. Assigning policies using Filter by Criteria allows policies to be deployed to endpoints across multiple domains. 41 Which of the following Security Agent components are protected from unauthorized modifications using the Agent Self-protection features in Apex One? Select all that apply. 108 y 109 Files in the Security Agent folder on the endpoint computer Smart Scan Agent Patterns, and Conventional Patterns Security Agent Registry settings Security Agent services 42 17 How is debug mode enabled on a Security Agent? Page 357 Edit the ofcscan.ini file on the Security Agent and enable the required debug level. Within the Security Agent console, click Help, click the Diagnostic Toolkit tab and click Debug Log. Click the letter A in the Apex One Web Management console title bar to display the Debug Log Settings window. Create an ofcdebug.ini file on the Security Agent computer and identify the required debug level. 43 Which of the following statements regarding Predictive Machine Learning is FALSE? Page 211 The Predictive Machine Learning model is fed a large number of good and bad files to teach it to identify malware. Predictive Machine Learning in Apex One works on files and processes. Predictive Machine Learning uses mathematical formulas contained in locally stored patterns to make a decision. The Security Agent extracts features of the file and submits it to the Predictive Machine Learning model to make a decision. 44 Which of the following is NOT a function of Damage Cleanup Services? Page 190 Killing processes created by Trojans. Quarantining processes created by Trojans. Deleting files and applications left behind by Trojans. Repairing system files modified by Trojans. 45 Multiple automatic grouping rules are created to sort Security Agents in the Apex One Agent tree. How will Apex One handle Security Agents that do not match any of the grouping rules? If no rules are matched during the grouping operation, the Agents are placed in a group called
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved