Pass the McAfee McAfee Certified Product Specialist MA0-107 Questions and answers with CertsForce

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

The security team wants to schedule an on-demand scan to run at noon every day for all workstations. However, the team would like to ensure system performance is not impacted because users may be working. Which of the following is a system utilization setting that meets this criteria?

Options:

A.

Below normal


B.

Low


C.

Scan only when the system is idle


D.

Normal


Expert Solution
Questions # 12:

An administrator is running new software, and a file is detected by the On-Access scanner as a Potentially Unwanted Program. In which of the following ways can the administrator prevent the file from being detected?

Options:

A.

Adding the process name within standard process settings


B.

Excluding by detection name


C.

Adding to Potentially Unwanted Program Detections.


D.

Configuring low-risk settings and low risk the software


Expert Solution
Questions # 13:

Which of the following describes the difference in functionality between Real Protect cloud-based and Real Protect client-based?

Options:

A.

The location where the centralized management server and policies are managed


B.

The location from which AMCore content updates are pulled before on-demand scans


C.

The location where the scanning is conducted on file attributes and behavior


D.

The location where malware is quarantined on the managed system


Expert Solution
Questions # 14:

The ENS administrator wants to monitor remotely the modification of files, but BigFix.exe is generating many false positives. Which of the following should the ENS administrator do?

Options:

A.

Exclude the file under Threat Prevention / Access Protection / Remotely creating or modifying Files or Folders.


B.

Add the file as a High Risk Process under Threat Prevention / On Access Scan / Process settings.


C.

Exclude the file under Common Options / Self Protection.


D.

Add the file under Threat Prevention / Options/ Exclusions by detection name.


Expert Solution
Questions # 15:

By default, an individual file is flushed from the Adaptive Threat Protection local reputation cache every:

Options:

A.

7 days.


B.

14 days.


C.

30 days.


D.

60 days.


Expert Solution
Questions # 16:

Which of the following groups of legacy products can be migrated to ENS 10.5?

Options:

A.

VirusScan Enterprise, Host Intrusion Prevention, and SiteAdvisor Enterprise


B.

Host Intrusion Prevention, SiteAdvisor Enterprise, and Data Loss Prevention


C.

VirusScan Enterprise, Host Intrusion Prevention, and Data Loss Prevention


D.

Host Intrusion Prevention, SiteAdvisor Enterprise, and Application Control


Expert Solution
Questions # 17:

An administrator notices that on one endpoint, Threat Prevention is not currently on the latest version of AMContent. The administrator presses the "Update Now" button within the console, but a message shows the update was unsuccessful. Which of the following logs should the administrator look at FIRST to troubleshoot the failure?

Options:

A.

EndpointSecurityPlatform_Activity.log


B.

ThreatPrevention_Activity.bg


C.

AccessProtection_Activity.log


D.

PackageManager_Activity.log


Expert Solution
Questions # 18:

Organizational security policy requires a host-based firewall on endpoints. Some endpoints have applications where documentation depicting network traffic flows is not readily available. Which of the following ENS 10.5 firewall features should be used to develop rules for their firewall policy?

Options:

A.

Location-aware Groups


B.

Trusted Networks


C.

Trusted Executables


D.

Adaptive Mode


Expert Solution
Questions # 19:

A user navigates to a website and notices a small blue square around an "M" in the upper-right corner of the Chrome browser. Which of the following does the blue color indicate within the toolbar?

Options:

A.

It is an internal website.


B.

Web Control is disabled.


C.

No rating is available.


D.

It is a phishing website.


Expert Solution
Questions # 20:

Which of the following is the benefit of a TIE server with regard to the Adaptive Threat Protection module?

Options:

A.

It communicates with McAfee GTI for file and certificate reputation for malicious code.


B.

It is required, and the Adaptive Threat Protection will only work with the TIE server.


C.

The Threat Protection cache flushes when the reputation rules change.


D.

The stored file and certificate reputations are locally stored, making the remediation automatically quicker.


Expert Solution
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions