Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

McAfee MA0-107 McAfee Certified Product Specialist - ENS Exam Practice Test

Page: 1 / 7
Total 70 questions

McAfee Certified Product Specialist - ENS Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36.75  $104.99
Question 1

While tuning the firewall policy, the ePO administrator notices unauthorized traffic is being initiated by a file transfer utility application. If this is a recently approved application, in which of the following locations should this be configured to allow FTP traffic only with this application?

Options:

A.

Add a new rule within the Access Protection policy to block port 21 and exclude the executable for the software.

B.

Put a new rule in the Exploit Prevention policy to include the executable for the software for additional protection.

C.

Exclude the process associated with the software within the On Access Scan policy's Low-Risk Processes section.

D.

Create an allow rule within the Rules policy for inbound/outbound on port 21 and the executable for the software.

Question 2

For which of the following reasons does ENS 10 store two previous versions of AMCore content?

Options:

A.

To allow for content rollback if it is needed

B.

To allow for comparison of detections between content versions

C.

To allow for backup when an Extra.DAT is deployed

D.

To allow for choice of which content to scan a file against

Question 3

An ePO administrator is experiencing issues installing an ENS module on a client machine and decides to investigate by analyzing the install log. In which of the following locations will the administrator find the install log, assuming it is in its default location on the endpoint?

Options:

A.

%programdata%\mcafee\datreputation\logs

B.

**\program files\mcafee\

C.

%temp%\mcafeelogs

D.

%programdata%\mcafee\Agent\logs

Question 4

Which of the following components can the Endpoint Migration Assistant tool migrate?

Options:

A.

Deployment tasks

B.

Dashboards

C.

Server tasks

D.

Host IPS catalog

Question 5

An administrator wants to know how many machines have exploit prevention enabled. Which of the following dashboards installed with ENS should the administrator look at?

Options:

A.

Endpoint Security: Environmental Health

B.

Endpoint Security: Threat Behavior

C.

Endpoint Security: Content Status

D.

Endpoint Security: Installation Status

Question 6

A company's security posture requires the ENS firewall to be enabled; however, the team is unsure of communication flows in the environment. In which of the following modes should the ePO administrator deploy the firewall policy to achieve flow awareness?

Options:

A.

Adaptive Mode

B.

Interface Mode

C.

Enforce Mode

D.

Observe Mode

Question 7

A hospital in another county just received a new variant of ransomware that infected 70% of its systems. After learning the characteristics of this ransomware, the security team wants to implement a protection policy to stop certain files from being modified and new registry keys from being created that are relevant to the ransomware. Which of the following policies meets this requirement?

Options:

A.

Exploit prevention policy

B.

Block and allow list policy

C.

Access protection policy

D.

Firewall rules policy

Question 8

On Windows 8 and 10 machines, Windows places a flag in the tile of an app, causing Windows to notify the user of a problem and directing the user to the Windows Store to reinstall. This flag is placed on the tile when the Threat Prevention scanner detects a threat in the path of an installed Windows Store app, and marks the application as:

Options:

A.

malicious.

B.

suspicious.

C.

questionable.

D.

tampered.

Question 9

A security professional is configuring ENS for a client and wants to ensure applications will be prevented from executing software locally from the browser or email client. Which of the following McAfee-defined rules should be implemented?

Options:

A.

Creating new executable files in the Windows folder

B.

Installing browser helper objects or shell extensions

C.

Registering programs to autorun

D.

Running files from common user folders by common programs

Question 10

If a TIE server is unavailable and the system is connected to the Internet, which of the following components can the Adaptive Threat Protection leverage for reputation decisions?

Options:

A.

Event Security Manager

B.

Global Threat Intelligence

C.

Data Exchange Layer

D.

Advanced Threat Defense

Page: 1 / 7
Total 70 questions