Trend Micro Network Security Quiz

ComfortingWetland avatar
ComfortingWetland
·
·
Download

Start Quiz

Study Flashcards

27 Questions

TippingPoint management is highly-regarded in the industry with one of the strongest features being the easy to use ______.

SMS

The devices can be managed via the CLI, LSM, or ______.

SMS

The CLI is accessed via a Console connection, SSH or ______ with Telnet being disabled by default.

Telnet

The LSM is accessed via HTTP and HTTPS which is the default and is a ______ interface.

GUI

A SMS device is not required but is recommended for managing devices. Initial setup of the SMS will be discussed ______.

later

A java based client can be downloaded from the SMS to a computer for management which then allows for device management once ______ in.

logged

An IPS device can then be imported into the SMS and managed through the ______ client.

SMS

TippingPoint solution starting at the bottom and building up.First we have the IPS and/or TPS ______.

devices

Accessing the device through the CLI requires a keyboard, monitor, and ______ cable.

Console

The Zero Day Initiative began in ______ and it is now one of the largest vendor-agnostic bug bounty programs in the world.

2005

The Zero Day Initiative was created to promote the responsible disclosure of ______.

vulnerabilities

An external researcher submits a previously unpatched vulnerability to the Zero Day Initiative, who validates the vulnerability, determines its worth, and makes a monetary offer to the ______.

researcher

Vulnerabilities are also submitted from ______ researchers.

internal

The Zero Day Initiative responsibly and promptly notifies the appropriate product vendor of a security flaw with their ______ or service(s).

product(s)

Simultaneously with the vendor being notified, Trend Micro works to create a Digital Vaccine filter to protect customers using TippingPoint solutions from the ______ vulnerability.

unpatched

The Zero Day Initiative will allow the vendor four months to address the vulnerability with a ______.

patch

The vendor will either release a patch for the vulnerability or indicate to the Zero Day Initiative that it is unable to, or chooses not to, patch the ______.

vulnerability

The Zero Day Initiative will publicly disclose the details of the vulnerability on its website in accordance with its ______ disclosure policy.

vulnerability

It includes: Next-generation IPS (Trend Micro™ TippingPoint™) Advanced Threat Protection (Trend Micro™ Deep Discovery™) Adaptive solutions for Operational Technologies (OT) (TXOne™ Networks) Trend Micro Network One preserves the integrity of the network while ensuring that data, communications, intellectual property, and other intangible assets are not monetized by unwanted third parties. A combination of nextgeneration intrusion prevention and proven breach detection enables the enterprise to prevent targeted attacks, advanced threats, and ______ from embedding or spreading within their network.

ransomware

As the cloud security leader, Trend Micro simplifies security with Trend Micro Cloud One™, an automated, flexible, all-inone security services platform for organizations building in the cloud. With the broadest and deepest set of security services on the market, including workload, container, serverless, file storage and network security, combined with the ability to ensure your cloud infrastructure is configured according to industry best practices and able to comply with key regulations, you can secure your entire environment with one powerful ______.

platform

With multiple built-in services, the Trend Micro Cloud One ______ enables organizations to be more agile, easily securing new cloud projects and providing the flexibility to adapt quickly to new business and compliance needs.

platform

Trend Micro Network One preserves the integrity of the network while ensuring that data, communications, intellectual property, and other intangible assets are not monetized by unwanted third parties. A combination of nextgeneration intrusion prevention and proven breach detection enables the enterprise to prevent targeted attacks, advanced threats, and ______ from embedding or spreading within their network.

ransomware

A combination of nextgeneration intrusion prevention and proven breach detection enables the enterprise to prevent targeted attacks, advanced threats, and ransomware from embedding or spreading within their ______.

network

Trend Micro Cloud One™ is an automated, flexible, all-inone security services ______ for organizations building in the cloud.

platform

With the broadest and deepest set of security services on the market, including workload, container, serverless, file storage and network security, combined with the ability to ensure your cloud infrastructure is configured according to industry best practices and able to comply with key regulations, you can secure your entire environment with one powerful ______.

platform

The Trend Micro Cloud One platform enables organizations to be more agile, easily securing new cloud projects and providing the flexibility to adapt quickly to new business and compliance ______.

needs

Trend Micro preserves the integrity of the network while ensuring that data, communications, intellectual property, and other intangible assets are not monetized by unwanted third parties. A combination of nextgeneration intrusion prevention and proven breach detection enables the enterprise to prevent targeted attacks, advanced threats, and ransomware from embedding or spreading within their ______.

network

Test your knowledge of Trend Micro network security solutions including Next-generation IPS, Advanced Threat Protection, and Adaptive solutions for Operational Technologies. Explore how these technologies preserve the integrity of the network and protect data from unwanted third parties.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser