Pass the McAfee McAfee Certified Product Specialist MA0-107 Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

An ENS administrator wants the end user to be able to view the web safety information. In addition to enabling Web Control, which of the following describes the requirements for this?

Options:

A.

The Web Control Plug-in site report must be enabled on the browser toolbar.


B.

Content Action settings must be configured to specify the action to apply according to the site rating.


C.

The Web Control Plug-in must be enabled in the browser, and "Warn" must be selected in Action Enforcement.


D.

The Web Control Plug-in must be enabled in the browser, and the client browser toolbar must be enabled.


Questions # 2:

The ePO administrators have already tuned and configured dynamic application containment rules within the policy. In which of the following ways will dynamic application containment protect against malware once enforcement is enabled?

Options:

A.

The scan engine will learn the behavior of the application and send up to GT1 for analysis, and then receive an action to block all actions from the application's process.


B.

If an application's reputation is below the threshold while triggering a block rule and is not an excluded application, malicious behavior of the application will be contained.


C.

The ENS client will receive the reputation as "highly suspicious" from either the McAfee GTI or TIE server, and then immediately uninstall the application on the system.


D.

The adaptive threat protection scanner will send the file automatically to a preconfigured "Sandbox" folder and analyze the application for malicious features before use.


Questions # 3:

An administrator wants to prevent incoming packets until the system reboots fully. Which of the following features should be configured to allow this?

Options:

A.

Treat McAfee GTI Match as an Intrusion


B.

Allow Bridged Traffic


C.

Allow Only Outgoing Traffic Until Firewall Services Have Started


D.

Block All Untrusted Executables


Questions # 4:

An administrator wants to allow remote users the ability to access the Internet from unsecure WiFi access points to connect to the VPN. Which of the following ENS 10.5 features should the administrator use to accomplish this?

Options:

A.

Trusted Networks


B.

Location-based Groups


C.

Timed Groups


D.

Connection Isolation Groups


Questions # 5:

An ePO administrator needs to add exclusions for a folder. The folder has been created in several locations, including C:\Program Files\Custom\Acme or C:\Program Files\Acme, but the folder could be located in other subfolders in the Program Files folder. Which of the following is the correct way to write an exclusion for the Acme folder?

Options:

A.

\Program Files\?\Acme


B.

\Program Files\**\Acme


C.

\Program Files\*\Acme


D.

\Program Files\??\Acme


Questions # 6:

A company's security posture requires the ENS firewall to be enabled; however, the team is unsure of communication flows in the environment. In which of the following modes should the ePO administrator deploy the firewall policy to achieve flow awareness?

Options:

A.

Adaptive Mode


B.

Interface Mode


C.

Enforce Mode


D.

Observe Mode


Questions # 7:

By using which of the following techniques does Real Protect scanner inspect suspicious files and activities on an endpoint to detect malicious patterns?

Options:

A.

Machine learning


B.

Intrusion prevention


C.

Sandboxing


D.

Static code analysis


Questions # 8:

A new ENS policy has been created and deployed, and a user contacts the help desk stating that a particular site is no longer accessible. Which of the following ENS Web Control policy categories is the culprit?

Options:

A.

Options


B.

Content Actions


C.

Browser Control


D.

Enforcement Messaging


Questions # 9:

Which of the following is the MAIN benefit of using Threat Intelligence Exchange (TIE) and Data Exchange Layer (DXL)?

Options:

A.

They enable centralized management of adaptive-threat-protection policies.


B.

They store and pass file reputation to managed endpoints and McAfee products.


C.

They distribute signature-based content to managed systems.


D.

They conduct scanning of files on managed systems for threats.


Questions # 10:

Which of the following methods should an administrator enable to address possible buffer overflow conditions?

Options:

A.

On-demand Scan


B.

Exploit Prevention


C.

Access Protection rules


D.

McAfee GTI feedback


Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions