Attemp 2 - Master User Protection
Attemp 2 - Master User Protection
1)
Which Apex One service is responsible for communication between the Security Agent and
Apex One server?
TmPfw.exe
TMBMSRV.exe
TmCCSF.exe
tmlisten.exe
2)
_______________ protects you from exploit attacks and uses a combination of pattern-based
and heuristic scanning to detect document exploits and other threats used in targeted attacks.
Behaviour Monitoring
Vulnerability Protection
Machine Learning
ATSE
3)
Customer mentioned in order to have effective XDR, they need to use all Trend Micro
products. That’s like putting all eggs into 1 basket. They prefer to have vendor segregation to
split the risk. What would your response be?
Build a BOM to switch customer’s email, endpoint, server, & network to Trend Micro. Pitch
on CTD story & build your overall dealsize
Customer is not the right candidate for XDR. Revisit them again in next half year
They don’t have to use all Trend Micro products to see benefit of XDR. The benefit can be
seen even with 1 product
Setup a meeting with global PM to share about Mitre APT 29 evaluation
4)
What are the features controlled by TmCCSF.exe Apex One security agent service?
5)
6)
The customer is already using Trend Micro Apex One and DSaaS(now Cloud One Workload
Security), and are looking to enhance their endpoint detection capabilities. What is the key
value proposition the customer need to know about Trend Micro XDR against other EDR
players?
Only Trend Micro XDR can offer Cloud Data Lake to customers
Trend Micro XDR offers cross correlations, big data analytics and enterprise threat visibility
across endpoint & hybrid cloud work load with single XDR console
Trend Micro XDR completely replace SIEM & SORE functions at SOC and offer cross
correlation, big data analytics and enterprise threat visibility across all endpoint, all network
devices & hybrid cloud work loads
Upselling XDR for user license, will make Trend Micro Apex One, DSaaS, EDR and XDR
cost cheaper for customer
7)
After obtaining a properly formatted Structured Threat Information Expression (STIX) file
(*.xml) from a trusted external source, the file is imported to Apex Central. Which of the
following is/are extracted to the UDSO list?
Domain objects
All of them
URL
IP address
8)
Correlating data from different vendors is often apples and oranges (speak different language)
Reducing the employees headcount they have today to manage SOC & IR
9)
10)
Which of the following is not a supported by Trend Micro for Threat Intelligence Sharing?
STIX
TAXII
UDSO
YAML
11)
TMUT Tool
Edge Relay
SPS
12)
13)
14)
Which of the following best describes "a field that uses statistical techniques to allow
machines to learn without being explicitly programmed"?
Artificial Intelligence
Advanced Analytics
Data Science
Machine Learning
15)
Trend Micro XDR leverages data lake for storing activity data. All the solutions come with
standard data retention period and also offers flexibility to the customers, if they wish to
extend beyond the default data retention period. Select whichever is applicable for which data
retention cannot be extended?
Cloud App Security Cloud One – Workload Security Deep Discovery Inspector
Apex One SaaS
16)
To attain a hybrid deployment of Apex One, which tool is used to connect to the SaaS setup?
Edge Relay
TMUT Tool
SPS
17)
All of them
19)
Hybrid
SaaS only
All of them
On-Premise only
20)
All of them
Single Choice
1)
“We are not ready to adopt your solution as of now…”, what is the best approach to handle such situation
out of the following?
Pass it over stating that they are not the right customer
All of them
Correlating data from different vendors is often apples and oranges (speak different
language)
Reducing the employees headcount they have today to manage SOC & IR
Multiple Choice
5)
Select whichever is applicable for Smart Protection for Endpoint(SPE) Suite:
Endpoint Security Mobile Security Email & Collaboration Security Web Security
Single Choice
6)
Which of the following is not a supported by Trend Micro for Threat Intelligence Sharing?
YAML
UDSO
STIX
TAXII
Multiple Choice
7)
What are the features controlled by TmCCSF.exe Apex One security agent service?
Data Loss Prevention Device Control Browser Exploit Prevention Memory Scanning
Single Choice
8)
Which Apex One service is responsible for communication between the Security Agent and Apex One
server?
TmCCSF.exe
tmlisten.exe
TMBMSRV.exe
TmPfw.exe
Single Choice
9)
When to leverage a whiteboard?
All of them
Simplify complex data
JSON
XML
Syslog
CSV
Single Choice
11)
XDR for Users bundle includes?
Deep Discovery Inspector Cloud App Security Cloud One – Workload Security Apex
One SaaS
Single Choice
13)
The customer is already using Trend Micro Apex One and DSaaS(now Cloud One Workload Security),
and are looking to enhance their endpoint detection capabilities. What is the key value proposition the
customer need to know about Trend Micro XDR against other EDR players?
Upselling XDR for user license, will make Trend Micro Apex One, DSaaS, EDR and XDR cost
cheaper for customer
Trend Micro XDR offers cross correlations, big data analytics and enterprise threat
visibility across endpoint & hybrid cloud work load with single XDR console
Trend Micro XDR completely replace SIEM & SORE functions at SOC and offer cross
correlation, big data analytics and enterprise threat visibility across all endpoint, all network
devices & hybrid cloud work loads
Only Trend Micro XDR can offer Cloud Data Lake to customers
Multiple Choice
14)
Select whichever is applicable for Smart Protection Complete(SPC) Suite:
Email & Collaboration Security Web Security Endpoint Security Deep Security
Single Choice
15)
XDR for Users Suite is supported for which of the platform/s?
All of them
SaaS only
On-Premise only
Hybrid
Single Choice
16)
Which of the following best describes "a field that uses statistical techniques to allow machines to learn
without being explicitly programmed"?
Machine Learning
Data Science
Artificial Intelligence
Advanced Analytics
Single Choice
17)
What is not an ideal way of handling an objection raised due to lack of awareness about the solution by the
customer?
Use this to your advantage and trick the customer by sharing false information
Conduct PoC
SPS
Edge Relay
TMUT Tool
Single Choice
20)
_______________ protects you from exploit attacks and uses a combination of pattern-based and heuristic
scanning to detect document exploits and other threats used in targeted attacks.
Vulnerability Protection
Machine Learning
Behaviour Monitoring
ATSE