0% found this document useful (0 votes)
89 views

Attemp 2 - Master User Protection

Trend Micro XDR offers cross-correlation of data across endpoints and cloud workloads, providing a single console for enterprise-wide threat visibility. While other EDR solutions focus only on the endpoint, XDR leverages Trend Micro's security stack to correlate threats across the entire environment. The customer's existing Trend Micro products make them a good fit for XDR to gain additional detection capabilities beyond a single point solution. Educating the customer on XDR's ability to offer a holistic view of threats across their full IT infrastructure would help address their needs over other EDR vendors.

Uploaded by

Haikal Dzulfikri
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
89 views

Attemp 2 - Master User Protection

Trend Micro XDR offers cross-correlation of data across endpoints and cloud workloads, providing a single console for enterprise-wide threat visibility. While other EDR solutions focus only on the endpoint, XDR leverages Trend Micro's security stack to correlate threats across the entire environment. The customer's existing Trend Micro products make them a good fit for XDR to gain additional detection capabilities beyond a single point solution. Educating the customer on XDR's ability to offer a holistic view of threats across their full IT infrastructure would help address their needs over other EDR vendors.

Uploaded by

Haikal Dzulfikri
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Score 60%

1)

Which Apex One service is responsible for communication between the Security Agent and
Apex One server?

TmPfw.exe

TMBMSRV.exe

TmCCSF.exe

tmlisten.exe

2)

_______________ protects you from exploit attacks and uses a combination of pattern-based
and heuristic scanning to detect document exploits and other threats used in targeted attacks.

Behaviour Monitoring

Vulnerability Protection

Machine Learning

ATSE

3)

Customer mentioned in order to have effective XDR, they need to use all Trend Micro
products. That’s like putting all eggs into 1 basket. They prefer to have vendor segregation to
split the risk. What would your response be?

Build a BOM to switch customer’s email, endpoint, server, & network to Trend Micro. Pitch
on CTD story & build your overall dealsize

Customer is not the right candidate for XDR. Revisit them again in next half year

They don’t have to use all Trend Micro products to see benefit of XDR. The benefit can be
seen even with 1 product
Setup a meeting with global PM to share about Mitre APT 29 evaluation
4)

What are the features controlled by TmCCSF.exe Apex One security agent service?

Data Loss Prevention Browser Exploit Prevention Device Control Memory


Scanning

5)

Select whichever is applicable for Smart Protection Complete(SPC) Suite:

Deep Security Endpoint Security Web Security Email & Collaboration


Security

6)

The customer is already using Trend Micro Apex One and DSaaS(now Cloud One Workload
Security), and are looking to enhance their endpoint detection capabilities. What is the key
value proposition the customer need to know about Trend Micro XDR against other EDR
players?

Only Trend Micro XDR can offer Cloud Data Lake to customers

Trend Micro XDR offers cross correlations, big data analytics and enterprise threat visibility
across endpoint & hybrid cloud work load with single XDR console

Trend Micro XDR completely replace SIEM & SORE functions at SOC and offer cross
correlation, big data analytics and enterprise threat visibility across all endpoint, all network
devices & hybrid cloud work loads

Upselling XDR for user license, will make Trend Micro Apex One, DSaaS, EDR and XDR
cost cheaper for customer

7)

After obtaining a properly formatted Structured Threat Information Expression (STIX) file
(*.xml) from a trusted external source, the file is imported to Apex Central. Which of the
following is/are extracted to the UDSO list?

Domain objects

All of them
URL

SHA-1 suspicious file

IP address

8)

Which of following is not a problem XDR is solving?

Correlating data from different vendors is often apples and oranges (speak different language)

Reducing SOC analyst fatigue by providing precise alerts for investigation

Reducing the employees headcount they have today to manage SOC & IR

Alert aggregation into SIEM is too noisy

Response often requires action across multiple security controls

9)

XDR for Users bundle includes?

Apex One as a Service only

Apex One as a Service & Deep Discovery Inspector

Apex One as a Service & Cloud App Security

Cloud App Security & Cloud One-Workload Security

10)

Which of the following is not a supported by Trend Micro for Threat Intelligence Sharing?

STIX

TAXII

UDSO
YAML

11)

How do you update patterns in an air gapped environment?

Remote Connector Tool

TMUT Tool

Edge Relay

SPS

12)

What does MDR stand for?

Managed Detection & Response

Multiple Detection & Response

Meantime Detection & Response

Merged Detection & Response

13)

Select whichever is applicable for Smart Protection for Endpoint(SPE) Suite:

Email & Collaboration Security Mobile Security Endpoint Security Web


Security

14)

Which of the following best describes "a field that uses statistical techniques to allow
machines to learn without being explicitly programmed"?

Artificial Intelligence
Advanced Analytics

Data Science

Machine Learning

15)

Trend Micro XDR leverages data lake for storing activity data. All the solutions come with
standard data retention period and also offers flexibility to the customers, if they wish to
extend beyond the default data retention period. Select whichever is applicable for which data
retention cannot be extended?

Cloud App Security Cloud One – Workload Security Deep Discovery Inspector
Apex One SaaS

16)

To attain a hybrid deployment of Apex One, which tool is used to connect to the SaaS setup?

Edge Relay

TMUT Tool

Remote Connector Tool

SPS

17)

When is DDAn integration required while deploying an Apex One solution?

For an air-gapped environment

For a large multi-site deployment

High availability deployment

For sandbox capabilities


18)

What should be ensured during Whiteboarding?

Do not keep it too long

Have a defined goal & focus on your purpose

Do not let the whiteboard go off track due to multiple conversations

All of them

19)

XDR for Users Suite is supported for which of the platform/s?

Hybrid

SaaS only

All of them

On-Premise only

20)

When to leverage a whiteboard?

All of them

Simplify complex data

When you are having a dead audience

Explain logical concepts, architecture, graphs

Single Choice
1)
“We are not ready to adopt your solution as of now…”, what is the best approach to handle such situation
out of the following?

Push hard to oversell your solution

Pass it over stating that they are not the right customer

Identify the reason behind why they are not ready

Pitch your solution again in a better way


Single Choice
2)
What does MDR stand for?

Merged Detection & Response

Meantime Detection & Response

Multiple Detection & Response

Managed Detection & Response


Single Choice
3)
What should be ensured during Whiteboarding?

Do not let the whiteboard go off track due to multiple conversations

All of them

Have a defined goal & focus on your purpose

Do not keep it too long


Single Choice
4)
Which of following is not a problem XDR is solving?

Correlating data from different vendors is often apples and oranges (speak different
language)

Response often requires action across multiple security controls

Alert aggregation into SIEM is too noisy


Reducing SOC analyst fatigue by providing precise alerts for investigation

Reducing the employees headcount they have today to manage SOC & IR
Multiple Choice
5)
Select whichever is applicable for Smart Protection for Endpoint(SPE) Suite:

Endpoint Security Mobile Security Email & Collaboration Security Web Security
Single Choice
6)
Which of the following is not a supported by Trend Micro for Threat Intelligence Sharing?

YAML

UDSO

STIX

TAXII
Multiple Choice
7)
What are the features controlled by TmCCSF.exe Apex One security agent service?

Data Loss Prevention Device Control Browser Exploit Prevention Memory Scanning
Single Choice
8)
Which Apex One service is responsible for communication between the Security Agent and Apex One
server?

TmCCSF.exe

tmlisten.exe

TMBMSRV.exe

TmPfw.exe
Single Choice
9)
When to leverage a whiteboard?

All of them
Simplify complex data

Explain logical concepts, architecture, graphs

When you are having a dead audience


Single Choice
10)
What is the underlying format for the Common Event Format (CEF)?

JSON

XML

Syslog

CSV
Single Choice
11)
XDR for Users bundle includes?

Apex One as a Service & Deep Discovery Inspector

Apex One as a Service only

Cloud App Security & Cloud One-Workload Security

Apex One as a Service & Cloud App Security


Multiple Choice
12)
Trend Micro XDR leverages data lake for storing activity data. All the solutions come with standard data
retention period and also offers flexibility to the customers, if they wish to extend beyond the default data
retention period. Select whichever is applicable for which data retention cannot be extended?

Deep Discovery Inspector Cloud App Security Cloud One – Workload Security Apex
One SaaS
Single Choice
13)
The customer is already using Trend Micro Apex One and DSaaS(now Cloud One Workload Security),
and are looking to enhance their endpoint detection capabilities. What is the key value proposition the
customer need to know about Trend Micro XDR against other EDR players?

Upselling XDR for user license, will make Trend Micro Apex One, DSaaS, EDR and XDR cost
cheaper for customer
Trend Micro XDR offers cross correlations, big data analytics and enterprise threat
visibility across endpoint & hybrid cloud work load with single XDR console

Trend Micro XDR completely replace SIEM & SORE functions at SOC and offer cross
correlation, big data analytics and enterprise threat visibility across all endpoint, all network
devices & hybrid cloud work loads

Only Trend Micro XDR can offer Cloud Data Lake to customers
Multiple Choice
14)
Select whichever is applicable for Smart Protection Complete(SPC) Suite:

Email & Collaboration Security Web Security Endpoint Security Deep Security
Single Choice
15)
XDR for Users Suite is supported for which of the platform/s?

All of them

SaaS only

On-Premise only

Hybrid
Single Choice
16)
Which of the following best describes "a field that uses statistical techniques to allow machines to learn
without being explicitly programmed"?

Machine Learning

Data Science

Artificial Intelligence

Advanced Analytics
Single Choice
17)
What is not an ideal way of handling an objection raised due to lack of awareness about the solution by the
customer?

Use this to your advantage and trick the customer by sharing false information
Conduct PoC

Educate on that particular area with better insight

Provide Product Instant Demo


Multiple Choice
18)
Apex Central can forward logs to a syslog server in which of the following log formats?

CSV LEEF Apex Central format Common Event Format (CEF)


Single Choice
19)
To attain a hybrid deployment of Apex One, which tool is used to connect to the SaaS setup?

Remote Connector Tool

SPS

Edge Relay

TMUT Tool
Single Choice
20)
_______________ protects you from exploit attacks and uses a combination of pattern-based and heuristic
scanning to detect document exploits and other threats used in targeted attacks.

Vulnerability Protection

Machine Learning

Behaviour Monitoring

ATSE

You might also like