Winter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

MA0-107 Sample Questions Answers

Questions 4

A hospital in another county just received a new variant of ransomware that infected 70% of its systems. After learning the characteristics of this ransomware, the security team wants to implement a protection policy to stop certain files from being modified and new registry keys from being created that are relevant to the ransomware. Which of the following policies meets this requirement?

Options:

A.

Exploit prevention policy

B.

Block and allow list policy

C.

Access protection policy

D.

Firewall rules policy

Buy Now
Questions 5

In Web Control, "Enable Web Category blocking of restricted content" is enforced. Which of the following describes the result if a user enters a restricted site?

Options:

A.

The color is gray, and access is denied.

B.

The pop-up color is red, and access is denied.

C.

The color is orange, and access is denied.

D.

The pop-up color is blue, and access denied.

Buy Now
Questions 6

By default, an individual file is flushed from the Adaptive Threat Protection local reputation cache every:

Options:

A.

7 days.

B.

14 days.

C.

30 days.

D.

60 days.

Buy Now
Questions 7

A user navigates to a website and notices a small blue square around an "M" in the upper-right corner of the Chrome browser. Which of the following does the blue color indicate within the toolbar?

Options:

A.

It is an internal website.

B.

Web Control is disabled.

C.

No rating is available.

D.

It is a phishing website.

Buy Now
Questions 8

An ePO administrator is experiencing issues installing an ENS module on a client machine and decides to investigate by analyzing the install log. In which of the following locations will the administrator find the install log, assuming it is in its default location on the endpoint?

Options:

A.

%programdata%\mcafee\datreputation\logs

B.

**\program files\mcafee\

C.

%temp%\mcafeelogs

D.

%programdata%\mcafee\Agent\logs

Buy Now
Questions 9

Dynamic Application Containment uses which of the following attributes of an executable to provide advanced protection?

Options:

A.

File behavior

B.

File name

C.

File size

D.

File source

Buy Now
Questions 10

For which of the following reasons does ENS 10 store two previous versions of AMCore content?

Options:

A.

To allow for content rollback if it is needed

B.

To allow for comparison of detections between content versions

C.

To allow for backup when an Extra.DAT is deployed

D.

To allow for choice of which content to scan a file against

Buy Now
Questions 11

An IT department is looking for a way to optimize performance with on-access scanning. To maximize security and minimize the impact on the system, on-access scanning should be configured to scan files at which of the following frequencies?

Options:

A.

Disable on-access scanning.

B.

Let McAfee decide.

C.

Only scan files on write.

D.

Only scan files on read.

Buy Now
Questions 12

An ENS administrator wants the end user to be able to view the web safety information. In addition to enabling Web Control, which of the following describes the requirements for this?

Options:

A.

The Web Control Plug-in site report must be enabled on the browser toolbar.

B.

Content Action settings must be configured to specify the action to apply according to the site rating.

C.

The Web Control Plug-in must be enabled in the browser, and "Warn" must be selected in Action Enforcement.

D.

The Web Control Plug-in must be enabled in the browser, and the client browser toolbar must be enabled.

Buy Now
Questions 13

Which of the following is the MAIN benefit of using Threat Intelligence Exchange (TIE) and Data Exchange Layer (DXL)?

Options:

A.

They enable centralized management of adaptive-threat-protection policies.

B.

They store and pass file reputation to managed endpoints and McAfee products.

C.

They distribute signature-based content to managed systems.

D.

They conduct scanning of files on managed systems for threats.

Buy Now
Questions 14

The security team has requested that adaptive threat protection be integrated with a TIE server. Which of the following is required?

Options:

A.

Data Exchange Layer

B.

Advanced Threat Defense

C.

Event Security Manager

D.

Active Response

Buy Now
Questions 15

A company's security posture requires the ENS firewall to be enabled; however, the team is unsure of communication flows in the environment. In which of the following modes should the ePO administrator deploy the firewall policy to achieve flow awareness?

Options:

A.

Adaptive Mode

B.

Interface Mode

C.

Enforce Mode

D.

Observe Mode

Buy Now
Questions 16

An ePO administrator needs to add exclusions for a folder. The folder has been created in several locations, including C:\Program Files\Custom\Acme or C:\Program Files\Acme, but the folder could be located in other subfolders in the Program Files folder. Which of the following is the correct way to write an exclusion for the Acme folder?

Options:

A.

\Program Files\?\Acme

B.

\Program Files\**\Acme

C.

\Program Files\*\Acme

D.

\Program Files\??\Acme

Buy Now
Questions 17

Organizational security policy requires a host-based firewall on endpoints. Some endpoints have applications where documentation depicting network traffic flows is not readily available. Which of the following ENS 10.5 firewall features should be used to develop rules for their firewall policy?

Options:

A.

Location-aware Groups

B.

Trusted Networks

C.

Trusted Executables

D.

Adaptive Mode

Buy Now
Questions 18

An engineer needs to allow a specific application to run. The engineer just finished creating an Exploit Prevention process exclusion. After applying the exclusion, the engineer notices the application is not being run. The following information is provided to the engineer:

Which of the following is the error with the engineer's exclusion?

Options:

A.

A signature ID was not entered.

B.

Exclusions are case sensitive.

C.

A hash was not specified.

D.

Wildcard was not used.

Buy Now
Questions 19

Which of the following components can the Endpoint Migration Assistant tool migrate?

Options:

A.

Deployment tasks

B.

Dashboards

C.

Server tasks

D.

Host IPS catalog

Buy Now
Questions 20

The ePO administrator sees the ENS firewall has been disabled on an endpoint in ePO. The end user states that no changes were made to the McAfee products on the endpoint in question. Which of the following questions should the administrator ask the end user about the McAfee icon to validate that the ENS firewall might be disabled?

Options:

A.

Is the icon flashing/blinking?

B.

Has the endpoint emitted a notification/alert sound (e.g., an error sound)?

C.

Is there a notification bubble displayed in the system notification area?

D.

Is the icon a color gray with a red/white exclamation mark?

Buy Now
Questions 21

The ePO administrators have already tuned and configured dynamic application containment rules within the policy. In which of the following ways will dynamic application containment protect against malware once enforcement is enabled?

Options:

A.

The scan engine will learn the behavior of the application and send up to GT1 for analysis, and then receive an action to block all actions from the application's process.

B.

If an application's reputation is below the threshold while triggering a block rule and is not an excluded application, malicious behavior of the application will be contained.

C.

The ENS client will receive the reputation as "highly suspicious" from either the McAfee GTI or TIE server, and then immediately uninstall the application on the system.

D.

The adaptive threat protection scanner will send the file automatically to a preconfigured "Sandbox" folder and analyze the application for malicious features before use.

Buy Now
Exam Code: MA0-107
Exam Name: McAfee Certified Product Specialist - ENS
Last Update: Nov 21, 2024
Questions: 70
$64  $159.99
$48  $119.99
$40  $99.99
buy now MA0-107