Labour Day Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

McAfee MA0-107 McAfee Certified Product Specialist - ENS Exam Practice Test

Page: 1 / 7
Total 70 questions

McAfee Certified Product Specialist - ENS Questions and Answers

Question 1

Which of the following describes the role of a cloud-based Real Protect scanner?

Options:

A.

It sends environmental variables to the cloud for analysis.

B.

It sends potentially malicious code to the cloud for analysis.

C.

It sends behavior information to the cloud for analysis.

D.

It sends personally identifiable information to the cloud for analysis.

Question 2

Security operations has recently received indicators of compromise (IOCs) detailing a new piece of malware for which coverage is not available. The threat advisory recommends a list of file paths and registry keys to prevent this new malware from successfully executing. Which of the following ENS 10.5 features should be used to achieve this goal?

Options:

A.

Web Control

B.

Exploit Prevention

C.

Real Protect

D.

Access Protection

Question 3

For which of the following reasons does ENS 10 store two previous versions of AMCore content?

Options:

A.

To allow for content rollback if it is needed

B.

To allow for comparison of detections between content versions

C.

To allow for backup when an Extra.DAT is deployed

D.

To allow for choice of which content to scan a file against

Question 4

Which of the following items are sent to the cloud when Real Protect scanning is enabled on endpoints that are connected to the Internet?

Options:

A.

System information

B.

Running process

C.

Behavioral information

D.

File reputation

Question 5

An administrator wants to prevent incoming packets until the system reboots fully. Which of the following features should be configured to allow this?

Options:

A.

Treat McAfee GTI Match as an Intrusion

B.

Allow Bridged Traffic

C.

Allow Only Outgoing Traffic Until Firewall Services Have Started

D.

Block All Untrusted Executables

Question 6

An ENS administrator is configuring on-access protection but finds the trusted backup tool is causing an unneeded performance impact. Which of the following actions should the administrator take?

Options:

A.

Endpoint Security Threat Prevention Policy Category / Threat Prevention Policy Category / Access Protection / Exclusion / Exclude the Backup Tool executable

B.

Endpoint Security Threat Prevention Policy Category / Exploit Prevention/Exclusions / Exclude Backup Tool executable

C.

Endpoint Security Threat Prevention Policy Category / On Access scan / Process Settings / Low Risk Processes / Exclude Backup Tool executable

D.

Enable McAfee GTI Feedback under Endpoint Security Threat Prevention Policy Category / Options / Proactive Data Analysis

Question 7

A user navigates to a website and notices a small blue square around an "M" in the upper-right corner of the Chrome browser. Which of the following does the blue color indicate within the toolbar?

Options:

A.

It is an internal website.

B.

Web Control is disabled.

C.

No rating is available.

D.

It is a phishing website.

Question 8

In which of the following locations are the installation log files stored by default on a Windows machine?

Options:

A.

%TEMP%\McAfeeLogs

B.

%PROGRAMDATA%\McAfee\Logs

C.

%USERDATA%\McAfeeLogFiles

D.

%PROGRAMFILES%\CommonFiles\McAfeeLogs

Question 9

After enabling a timed group in the firewall policy, in which of the following ways does the user enable the group?

Options:

A.

Moving the mouse to the upper-right corner of the screen

B.

Running MFEtime.exe from the start menu

C.

From the McAfee system tray icon

D.

Inside the ENS console

Question 10

Organizational security policy requires a host-based firewall on endpoints. Some endpoints have applications where documentation depicting network traffic flows is not readily available. Which of the following ENS 10.5 firewall features should be used to develop rules for their firewall policy?

Options:

A.

Location-aware Groups

B.

Trusted Networks

C.

Trusted Executables

D.

Adaptive Mode

Page: 1 / 7
Total 70 questions