Winter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

MA0-101 Sample Questions Answers

Questions 4

Which database is supported for Network Security Manager?

Options:

A.

MSSQL

B.

Oracle

C.

MySQL

D.

Sybase

Buy Now
Questions 5

Which policy is assigned to a child domain by default?

Options:

A.

The default IDS policy

B.

The default IPS policy

C.

No default policy

D.

The policy of the parent domain

Buy Now
Questions 6

In L3 mode, a sensor detects an L2 device based on which address?

Options:

A.

MAC

B.

IP

C.

Default Gateway

D.

DNS

Buy Now
Questions 7

Setting a threshold limit in order for the IPS to react if traffic volume exceeds this limit is an example of which type of detection method?

Options:

A.

Statistical anomaly

B.

Protocol anomaly

C.

Pattern matching

D.

Application anomaly

Buy Now
Questions 8

Which port needs to be opened for Alert Viewer communication between Client and Manager through a firewall?

Options:

A.

8501

B.

8502

C.

8503

D.

8555

Buy Now
Questions 9

When McAfee NAC reports the host status as unmanaged with an Unknown Hearth Level, the sensor redirects the host to which of the following?

Options:

A.

Guest Client Portal

B.

NAC Client Portal

C.

Sensor Client Portal

D.

DNS Server Portal

Buy Now
Questions 10

When the buffer on the alert cache has been filled, what happens to current incoming alerts?

Options:

A.

Incoming alerts are added to the cache and the oldest alerts are dropped

B.

Incoming alerts are not added to the cache and are dropped

C.

Incoming alerts are held in queue until cache space is cleared

D.

Incoming alerts are added to the database directly

Buy Now
Questions 11

Setting a threshold on a sensor to react if traffic volume exceeds the threshold limit is an example of what specific detection method?

Options:

A.

Signature based

B.

DHCP based

C.

Pattern matching

D.

Denial of Service (DoS)

Buy Now
Questions 12

Malware Protection requires which of the following feature or features to be enabled?

Options:

A.

HTTP response scanning

B.

Attack Filters

C.

Performance Monitoring

D.

The "Default Inline IPS" policy

Buy Now
Questions 13

Which CLI command is used to determine that the Sensor has established trust with the Manager?

Options:

A.

config

B.

status

C.

trust

D.

show

Buy Now
Questions 14

Which sensor action allows the detection and dropping of attacks in real-time?

Options:

A.

Host Quarantine action

B.

ICMP Host unreachable

C.

TCP reset

D.

Drop further packets

Buy Now
Questions 15

Which of the following is the correct extension for a Sensor image imported into the Manager?

Options:

A.

ext

B.

.opt

C.

jar

D.

.mfe

Buy Now
Questions 16

Which NSP sensor models support SSL encryption? (Choose three)

Options:

A.

M-4050

B.

M-1450

C.

M-2750

D.

M-1250

E.

M-6050

Buy Now
Questions 17

Which attack cannot be blocked when the sensor has been set for in-line mode?

Options:

A.

TCP Control Anomaly

B.

ICMP Echo Anomaly

C.

Too Many Inbound Syn

D.

SCADA Attacks

Buy Now
Questions 18

Which CLI command is used to copy sensor SSL certificates from external flash when replacing a failed sensor?

Options:

A.

Exportsensorcerts

B.

Importsensorcerts

C.

Exportcerts

D.

Importcerts

Buy Now
Questions 19

Which port needs to be opened for Alert Channel communication between Sensor and Manager through a firewall?

Options:

A.

8501

B.

8502

C.

8503

D.

8555

Buy Now
Questions 20

IPS Policies can be enforced at which of the following sensor nodes?

Options:

A.

Sensor name node only

B.

Sensor name and interface node only

C.

Sensor sub-interface node only

D.

Sensor name, interface and sub-interface node

Buy Now
Questions 21

A Reconnaissance Policy can be applied to which of the following?

Options:

A.

Sensors

B.

Sensor Ports

C.

Sensors and sensor ports

D.

Specific Hosts

Buy Now
Questions 22

Which of the following methods are available for upgrading a Sensor image?

Options:

A.

TFTP and/or through the Manager

B.

PUTTY and/or through the Manager

C.

Console connection and/or through the Manager

D.

TFTP, console connection and/or through the Manager

Buy Now
Questions 23

Which domains does a Super User have full rights to access?

Options:

A.

Super Users have full rights to all domains

B.

Super Users have full rights to only the domains in which they reside

C.

Super Users have full rights to only sensor configuration

D.

Super Users have full rights to only Parent domains

Buy Now
Questions 24

Where in the Network Security Manager console can you see a hierarchical view of all the installed applications currently deployed and the resources associated with each?

Options:

A.

Device List

B.

Resource Tree

C.

Details Pane

D.

System Links

Buy Now
Questions 25

Which logs are used to determine who was logged into the Manager the last time a signature set update was pushed from the Manager to the Sensor?

Options:

A.

Trace log

B.

Fault log

C.

Manager ems log

D.

User Activity Audit log

Buy Now
Questions 26

Which command can be issued on a Sensor to check the health of the Sensor?

Options:

A.

show

B.

show settings

C.

status

D.

check health

Buy Now
Questions 27

Which of the following items can an ACL not match?

Options:

A.

Source IP address

B.

Destination IP address

C.

MAC address

D.

Protocol

Buy Now
Exam Code: MA0-101
Exam Name: McAfee Certified Product Specialist – NSP
Last Update: Nov 21, 2024
Questions: 90
$64  $159.99
$48  $119.99
$40  $99.99
buy now MA0-101