Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

MA0-101 Exam Dumps - McAfee Certified Product Specialist - NSP

Question # 4

As a recommended best practice, what is the total number of sensors that should be managed through a single Network Security Manager installation?

A.

25

B.

50

C.

75

D.

100

Full Access
Question # 5

If the Health level of a Host cannot be determined. McAfee NAC assigns which of the following System Health levels to that Host?

A.

Fair

B.

Poor

C.

Serious

D.

Unknown

Full Access
Question # 6

Setting a threshold limit in order for the IPS to react if traffic volume exceeds this limit is an example of which type of detection method?

A.

Statistical anomaly

B.

Protocol anomaly

C.

Pattern matching

D.

Application anomaly

Full Access
Question # 7

Which of the following options is the best practice to use if you need to edit all attacks with a specific seventy number within an IPS policy?

A.

Use the Bulk Edit feature within the Policy Editor

B.

Create and run the appropriate database query

C.

Edit the attacks individually

D.

Use the Bulk Edit feature within the Reconnaissance Editor

Full Access
Question # 8

Which of the following commands will reestablish the Alert and packet log channel connection between the sensor and manager?

A.

Connectalertandpktlogchannels

B.

Disconnectalertandptologchannels

C.

reconnectalertandpktlogchannets

D.

deinstall

Full Access
Question # 9

Which sensor action detects and drop attacks in real-time?

A.

Drop further packets

B.

Host Quarantine action

C.

TCP reset

D.

ICMP host unreachable

Full Access
Question # 10

Which of the following is the proper step to take if an IP address change is made to the server where the Network Security Manager has been installed?

A.

Change the IP address in the Network Security Manager settings

B.

Change the IP address through a command-line statement

C.

Reinstall the Network Security Manager

D.

The IP address can never be changed on the Network Security Manager

Full Access
Question # 11

Which logs are used to determine who was logged into the Manager the last time a signature set update was pushed from the Manager to the Sensor?

A.

Trace log

B.

Fault log

C.

Manager ems log

D.

User Activity Audit log

Full Access
Question # 12

Which of the following modes can be used to implement DoS detection? (Choose two)

A.

Learning Mode

B.

Threshold Mode

C.

Configuration Mode

D.

Adaptive Mode

E.

Transition Mode

Full Access
Question # 13

What is the CLI command that enables the output of the MAC/IP address mapping table to the sensor debug files?

A.

arp spoof status

B.

arp spoof enable

C.

arp dump

D.

arp flush

Full Access