Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

MA0-107 Exam Dumps - McAfee Certified Product Specialist - ENS

Question # 4

Which of the following describes the role of a cloud-based Real Protect scanner?

A.

It sends environmental variables to the cloud for analysis.

B.

It sends potentially malicious code to the cloud for analysis.

C.

It sends behavior information to the cloud for analysis.

D.

It sends personally identifiable information to the cloud for analysis.

Full Access
Question # 5

Which of the following components can the Endpoint Migration Assistant tool migrate?

A.

Deployment tasks

B.

Dashboards

C.

Server tasks

D.

Host IPS catalog

Full Access
Question # 6

The organization's desktop engineering team wants to include ENS 10 within their desktop imaging process. They would like to install all modules silently. Which of the following is the correct command-line syntax to accomplish this task?

A.

setupEP.exe ADDLOCAL="all" /qb!

B.

setupEP.exe ADDLOCAL="all" /qn

C.

setupEP.exe ADDLOCAL="fw,tp,wc" /qb!

D.

setupEP.exe ADDLOCAL="fw,tp,wc" /qn

Full Access
Question # 7

Organizational security policy requires a host-based firewall on endpoints. Some endpoints have applications where documentation depicting network traffic flows is not readily available. Which of the following ENS 10.5 firewall features should be used to develop rules for their firewall policy?

A.

Location-aware Groups

B.

Trusted Networks

C.

Trusted Executables

D.

Adaptive Mode

Full Access
Question # 8

Which of the following methods should an administrator enable to address possible buffer overflow conditions?

A.

On-demand Scan

B.

Exploit Prevention

C.

Access Protection rules

D.

McAfee GTI feedback

Full Access
Question # 9

The ePO administrators have already tuned and configured dynamic application containment rules within the policy. In which of the following ways will dynamic application containment protect against malware once enforcement is enabled?

A.

The scan engine will learn the behavior of the application and send up to GT1 for analysis, and then receive an action to block all actions from the application's process.

B.

If an application's reputation is below the threshold while triggering a block rule and is not an excluded application, malicious behavior of the application will be contained.

C.

The ENS client will receive the reputation as "highly suspicious" from either the McAfee GTI or TIE server, and then immediately uninstall the application on the system.

D.

The adaptive threat protection scanner will send the file automatically to a preconfigured "Sandbox" folder and analyze the application for malicious features before use.

Full Access
Question # 10

A company's security posture requires the ENS firewall to be enabled; however, the team is unsure of communication flows in the environment. In which of the following modes should the ePO administrator deploy the firewall policy to achieve flow awareness?

A.

Adaptive Mode

B.

Interface Mode

C.

Enforce Mode

D.

Observe Mode

Full Access