Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Trend Exam TM1-101 Topic 1 Question 71 Discussion

Actual exam question for Trend's TM1-101 exam
Question #: 71
Topic #: 1
[All TM1-101 Questions]

When Server Protect detects an infected file, which three actions can you configure the software to initiate?

(Choose three.)

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Patria
1 months ago
I'm just glad 'Summon the virus-fighting unicorn' isn't one of the options. Though that would be a pretty cool feature.
upvoted 0 times
...
Arlyne
1 months ago
Wait, I can send the infected file back to the user? Hmm, I wonder if they'd appreciate that... 'Surprise, your computer has a virus!' Not the best customer service strategy.
upvoted 0 times
...
Buffy
1 months ago
Haha, shutting down the entire server just because one file is infected? Bit of an overreaction, don't you think? I'll stick with the sensible options.
upvoted 0 times
Blondell
15 days ago
D) delete the infected file automatically
upvoted 0 times
...
Jules
19 days ago
B) clean and restore the file
upvoted 0 times
...
Willis
20 days ago
A) bypass or ignore the file
upvoted 0 times
...
...
Marnie
1 months ago
I'm not sure about deleting the backup file after cleaning - that seems a bit risky. But overall, this looks like a solid set of options to deal with malware.
upvoted 0 times
Lezlie
3 days ago
A) bypass or ignore the file
upvoted 0 times
...
...
Katheryn
2 months ago
B, D, and E seem like the most reasonable options here. Cleaning and restoring the file, deleting it automatically, and sending it to a BAIT folder all make sense for handling an infected file.
upvoted 0 times
Temeka
7 hours ago
I would choose B, D, and E as well. Those actions seem like the most effective way to deal with an infected file.
upvoted 0 times
...
Temeka
4 days ago
I think cleaning and restoring the file, deleting it automatically, and sending it to a BAIT folder are the best actions to configure.
upvoted 0 times
...
Temeka
6 days ago
I agree, B, D, and E are the most reasonable options for handling an infected file.
upvoted 0 times
...
Barrie
17 days ago
Yes, bypassing or ignoring the file might not fully address the issue, so cleaning, deleting, and sending to a BAIT folder are safer options.
upvoted 0 times
...
Virgina
20 days ago
I think bypassing or ignoring the file could be risky, it's better to clean and restore, delete automatically, and send to a BAIT folder.
upvoted 0 times
...
Brandon
21 days ago
I agree, cleaning and restoring the file, deleting it automatically, and sending it to a BAIT folder are the most effective actions.
upvoted 0 times
...
Ivan
1 months ago
B, D, and E are definitely the best options for handling an infected file.
upvoted 0 times
...
...
Cassi
2 months ago
I also think we should delete the infected file automatically to ensure it doesn't cause any harm.
upvoted 0 times
...
Kathrine
2 months ago
I agree with Nieves, cleaning and restoring the file is important to prevent further spread of infection.
upvoted 0 times
...
Nieves
2 months ago
I think we should clean and restore the file.
upvoted 0 times
...
Leonida
2 months ago
But why would you want to return the infected file to the user?
upvoted 0 times
...
Lorean
3 months ago
I disagree, I believe it's A, C, and F.
upvoted 0 times
...
Leonida
3 months ago
I think the correct actions are B, D, and E.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77