27 Questions
TippingPoint management is highly-regarded in the industry with one of the strongest features being the easy to use ______.
SMS
The devices can be managed via the CLI, LSM, or ______.
SMS
The CLI is accessed via a Console connection, SSH or ______ with Telnet being disabled by default.
Telnet
The LSM is accessed via HTTP and HTTPS which is the default and is a ______ interface.
GUI
A SMS device is not required but is recommended for managing devices. Initial setup of the SMS will be discussed ______.
later
A java based client can be downloaded from the SMS to a computer for management which then allows for device management once ______ in.
logged
An IPS device can then be imported into the SMS and managed through the ______ client.
SMS
TippingPoint solution starting at the bottom and building up.First we have the IPS and/or TPS ______.
devices
Accessing the device through the CLI requires a keyboard, monitor, and ______ cable.
Console
The Zero Day Initiative began in ______ and it is now one of the largest vendor-agnostic bug bounty programs in the world.
2005
The Zero Day Initiative was created to promote the responsible disclosure of ______.
vulnerabilities
An external researcher submits a previously unpatched vulnerability to the Zero Day Initiative, who validates the vulnerability, determines its worth, and makes a monetary offer to the ______.
researcher
Vulnerabilities are also submitted from ______ researchers.
internal
The Zero Day Initiative responsibly and promptly notifies the appropriate product vendor of a security flaw with their ______ or service(s).
product(s)
Simultaneously with the vendor being notified, Trend Micro works to create a Digital Vaccine filter to protect customers using TippingPoint solutions from the ______ vulnerability.
unpatched
The Zero Day Initiative will allow the vendor four months to address the vulnerability with a ______.
patch
The vendor will either release a patch for the vulnerability or indicate to the Zero Day Initiative that it is unable to, or chooses not to, patch the ______.
vulnerability
The Zero Day Initiative will publicly disclose the details of the vulnerability on its website in accordance with its ______ disclosure policy.
vulnerability
It includes: Next-generation IPS (Trend Micro™ TippingPoint™) Advanced Threat Protection (Trend Micro™ Deep Discovery™) Adaptive solutions for Operational Technologies (OT) (TXOne™ Networks) Trend Micro Network One preserves the integrity of the network while ensuring that data, communications, intellectual property, and other intangible assets are not monetized by unwanted third parties. A combination of nextgeneration intrusion prevention and proven breach detection enables the enterprise to prevent targeted attacks, advanced threats, and ______ from embedding or spreading within their network.
ransomware
As the cloud security leader, Trend Micro simplifies security with Trend Micro Cloud One™, an automated, flexible, all-inone security services platform for organizations building in the cloud. With the broadest and deepest set of security services on the market, including workload, container, serverless, file storage and network security, combined with the ability to ensure your cloud infrastructure is configured according to industry best practices and able to comply with key regulations, you can secure your entire environment with one powerful ______.
platform
With multiple built-in services, the Trend Micro Cloud One ______ enables organizations to be more agile, easily securing new cloud projects and providing the flexibility to adapt quickly to new business and compliance needs.
platform
Trend Micro Network One preserves the integrity of the network while ensuring that data, communications, intellectual property, and other intangible assets are not monetized by unwanted third parties. A combination of nextgeneration intrusion prevention and proven breach detection enables the enterprise to prevent targeted attacks, advanced threats, and ______ from embedding or spreading within their network.
ransomware
A combination of nextgeneration intrusion prevention and proven breach detection enables the enterprise to prevent targeted attacks, advanced threats, and ransomware from embedding or spreading within their ______.
network
Trend Micro Cloud One™ is an automated, flexible, all-inone security services ______ for organizations building in the cloud.
platform
With the broadest and deepest set of security services on the market, including workload, container, serverless, file storage and network security, combined with the ability to ensure your cloud infrastructure is configured according to industry best practices and able to comply with key regulations, you can secure your entire environment with one powerful ______.
platform
The Trend Micro Cloud One platform enables organizations to be more agile, easily securing new cloud projects and providing the flexibility to adapt quickly to new business and compliance ______.
needs
Trend Micro preserves the integrity of the network while ensuring that data, communications, intellectual property, and other intangible assets are not monetized by unwanted third parties. A combination of nextgeneration intrusion prevention and proven breach detection enables the enterprise to prevent targeted attacks, advanced threats, and ransomware from embedding or spreading within their ______.
network
Test your knowledge of Trend Micro network security solutions including Next-generation IPS, Advanced Threat Protection, and Adaptive solutions for Operational Technologies. Explore how these technologies preserve the integrity of the network and protect data from unwanted third parties.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free