Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Trend Exam TM1-101 Topic 1 Question 71 Discussion

Actual exam question for Trend's TM1-101 exam
Question #: 71
Topic #: 1
[All TM1-101 Questions]

When Server Protect detects an infected file, which three actions can you configure the software to initiate?

(Choose three.)

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Margurite
2 days ago
I think one of the actions is definitely to clean and restore the file. That seems like a standard option.
upvoted 0 times
...
Amalia
5 days ago
Okay, I've got this. FEC is used to group packets that get the same forwarding treatment, so the allocation would be based on criteria like service type, application protocol, or destination address. I'm confident I can answer this one.
upvoted 0 times
...
Viki
10 days ago
Hmm, this looks like a tricky one. I'll need to carefully read through each option and think about how the "Asc" property types work.
upvoted 0 times
...
Patria
5 months ago
I'm just glad 'Summon the virus-fighting unicorn' isn't one of the options. Though that would be a pretty cool feature.
upvoted 0 times
...
Arlyne
5 months ago
Wait, I can send the infected file back to the user? Hmm, I wonder if they'd appreciate that... 'Surprise, your computer has a virus!' Not the best customer service strategy.
upvoted 0 times
...
Buffy
5 months ago
Haha, shutting down the entire server just because one file is infected? Bit of an overreaction, don't you think? I'll stick with the sensible options.
upvoted 0 times
Blondell
4 months ago
D) delete the infected file automatically
upvoted 0 times
...
Jules
4 months ago
B) clean and restore the file
upvoted 0 times
...
Willis
4 months ago
A) bypass or ignore the file
upvoted 0 times
...
...
Marnie
5 months ago
I'm not sure about deleting the backup file after cleaning - that seems a bit risky. But overall, this looks like a solid set of options to deal with malware.
upvoted 0 times
Ma
3 months ago
D) delete the infected file automatically
upvoted 0 times
...
Kaitlyn
3 months ago
B) clean and restore the file
upvoted 0 times
...
Lezlie
4 months ago
A) bypass or ignore the file
upvoted 0 times
...
...
Katheryn
6 months ago
B, D, and E seem like the most reasonable options here. Cleaning and restoring the file, deleting it automatically, and sending it to a BAIT folder all make sense for handling an infected file.
upvoted 0 times
Temeka
4 months ago
I would choose B, D, and E as well. Those actions seem like the most effective way to deal with an infected file.
upvoted 0 times
...
Temeka
4 months ago
I think cleaning and restoring the file, deleting it automatically, and sending it to a BAIT folder are the best actions to configure.
upvoted 0 times
...
Temeka
4 months ago
I agree, B, D, and E are the most reasonable options for handling an infected file.
upvoted 0 times
...
Barrie
4 months ago
Yes, bypassing or ignoring the file might not fully address the issue, so cleaning, deleting, and sending to a BAIT folder are safer options.
upvoted 0 times
...
Virgina
4 months ago
I think bypassing or ignoring the file could be risky, it's better to clean and restore, delete automatically, and send to a BAIT folder.
upvoted 0 times
...
Brandon
4 months ago
I agree, cleaning and restoring the file, deleting it automatically, and sending it to a BAIT folder are the most effective actions.
upvoted 0 times
...
Ivan
5 months ago
B, D, and E are definitely the best options for handling an infected file.
upvoted 0 times
...
...
Cassi
6 months ago
I also think we should delete the infected file automatically to ensure it doesn't cause any harm.
upvoted 0 times
...
Kathrine
6 months ago
I agree with Nieves, cleaning and restoring the file is important to prevent further spread of infection.
upvoted 0 times
...
Nieves
6 months ago
I think we should clean and restore the file.
upvoted 0 times
...
Leonida
6 months ago
But why would you want to return the infected file to the user?
upvoted 0 times
...
Lorean
6 months ago
I disagree, I believe it's A, C, and F.
upvoted 0 times
...
Leonida
6 months ago
I think the correct actions are B, D, and E.
upvoted 0 times
...

Save Cancel