0% found this document useful (0 votes)
107 views3 pages

Preguntas Apex One 1

The Active Directory/Ip Scope must be configured before taking advantage of the Unmanaged Endpoint feature in Apex One. The limitations of a Security Agent running in Independent Mode include that it does not run real-time scans or initiate scan commands from the Apex One Server. Agents are added to a new IP Address Grouping when their connection status changes from offline to online.

Uploaded by

Grupo Tzipori
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
107 views3 pages

Preguntas Apex One 1

The Active Directory/Ip Scope must be configured before taking advantage of the Unmanaged Endpoint feature in Apex One. The limitations of a Security Agent running in Independent Mode include that it does not run real-time scans or initiate scan commands from the Apex One Server. Agents are added to a new IP Address Grouping when their connection status changes from offline to online.

Uploaded by

Grupo Tzipori
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Wich of the following must be configured before taking advantage of the Unmanaged Endpoint

feature in Apex One?

The Agent Tree Scope must be configured.

The Port Range Scope must be configured.

The Trace Route Scope must be configured.

The Active Directory/Ip Scope must be configured.

What are some of the limitations of a Security Agent running in Independent Mode? Select all
answers that apply.

The Security Agent does not run real-time scans.

The Security Agent does not initate scan commands from the Apex One Server.

The Security Agent denies access to shared folders.

The Security Agent does not accept policy settings from the Apex One Server

A new IP Address Grouping is configured as in the exhibit. The new grouping called Lab is created,
but when checking the Agent List, no Agents are displayed in the group even though Agents do
exist within the IP address range. Which of the following events Will trigger the addition of the
Agents to the group? Selecta ll answers that apply.
Agents are added to the group when their connection status changes from offline to online

Agents must be added to the group manually.

Agents are added to the group when the administrator runs the Sort Client operation.

Agents are added to the group when they register to the Server for the first time.

Wich of the following is NOT a valid method of installing a Security Agento on an enpoint
computer?

Logn Script (AutoPcc)

Agent Packager Tool

Agent Mover Tool (IpXfer.exe)

Apex Central Security Agent installation

Which of the following Apex One features are enabled by integrating with Microsoft Active
Directory? Select all the answers that apply

Active Directory can be used to automaticaly group agents based on an Active Directory domain
and map them to domains in the Apex One Security Agent tree

Apex One can query Active Directory to locate endpoints computers whitout Security Agents
installed

Apex One can query Active Directory to identify endpoint using third-party Security software and
target them for uninstalation

Administrative capabilities in the Apex One Web Management console can be assigned to Active
Directory accounts.

Which of the following statements regarding the use of the IIS Web server with Apex One is FALSE?

The Web Server enables communication with the integrated Smart Protection Server.

The Web Server enables communication with the Standalone Smart Protection Server.

The Web Server provides Access tothe Apex One Web Management console.

The Web Server enables Security Agent to Server communications.

Which of the following services is always running on an Apex One Server, regardless of the options
selected during setup?
Trend Micro Web Classification Service

Real-time Scan Service

Trend Micro File Reputation Service

Apex One Master Service

Which one of the following is NOT a capability of the Apex One Ransonware protection?

Decrypts ransomware encrypted files.

Protects documents aganst unauthorized encryption Operations.

Blocks processes commonly associated with ransomware.

Automatically backs up and restore files encrypted by unauthorized Operations.

Which of the following statements regarding the Digital Signature Cache used by Security Agents is
FALSE?

The Digital Signature Cache is rebuilt on a regular bass to add the signature of new files that were
introduced to the system since the last cache file was built

Administrator can configure the Digital Signature Cache settings to include the digital signatures
trustwarthy files stored in any folder on the endpoint computer.

Files residing within the Windows folder which have a digital signature applied to them
automatically added to the Digital Signature Cache.

Security Agents do not scan files whose signatures have been added to the Digital Signature Cache.

Predictive Machine Learning in Apex One can examine files from which of the following channels?
Select all answers that apply

USB

Selected Web browsers

Microsoft Outlook

Files copied from a network share using Windows Explorer

You might also like