Halloween Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

An administrator wants to see more details about recent activity on an endpoint than what is shown in the ENS console. In which of the following locations can the administrator view the log files?

A.

%ProgramFiles%\McAfee\Logs

B.

%ProgramFiles%\McAfee\Endpoint Security\Logs

C.

%ProgramData%\McAfee\Endpoint Security\Logs

D.

%ProgramData%\McAfee\Logs

After enabling a timed group in the firewall policy, in which of the following ways does the user enable the group?

A.

Moving the mouse to the upper-right corner of the screen

B.

Running MFEtime.exe from the start menu

C.

From the McAfee system tray icon

D.

Inside the ENS console

A hospital in another county just received a new variant of ransomware that infected 70% of its systems. After learning the characteristics of this ransomware, the security team wants to implement a protection policy to stop certain files from being modified and new registry keys from being created that are relevant to the ransomware. Which of the following policies meets this requirement?

A.

Exploit prevention policy

B.

Block and allow list policy

C.

Access protection policy

D.

Firewall rules policy

Dynamic Application Containment uses which of the following attributes of an executable to provide advanced protection?

A.

File behavior

B.

File name

C.

File size

D.

File source

The organization's desktop engineering team wants to include ENS 10 within their desktop imaging process. They would like to install all modules silently. Which of the following is the correct command-line syntax to accomplish this task?

A.

setupEP.exe ADDLOCAL="all" /qb!

B.

setupEP.exe ADDLOCAL="all" /qn

C.

setupEP.exe ADDLOCAL="fw,tp,wc" /qb!

D.

setupEP.exe ADDLOCAL="fw,tp,wc" /qn

The ENS administrator wants to monitor remotely the modification of files, but BigFix.exe is generating many false positives. Which of the following should the ENS administrator do?

A.

Exclude the file under Threat Prevention / Access Protection / Remotely creating or modifying Files or Folders.

B.

Add the file as a High Risk Process under Threat Prevention / On Access Scan / Process settings.

C.

Exclude the file under Common Options / Self Protection.

D.

Add the file under Threat Prevention / Options/ Exclusions by detection name.

In Web Control, "Enable Web Category blocking of restricted content" is enforced. Which of the following describes the result if a user enters a restricted site?

A.

The color is gray, and access is denied.

B.

The pop-up color is red, and access is denied.

C.

The color is orange, and access is denied.

D.

The pop-up color is blue, and access denied.

A security professional is configuring ENS for a client and wants to ensure applications will be prevented from executing software locally from the browser or email client. Which of the following McAfee-defined rules should be implemented?

A.

Creating new executable files in the Windows folder

B.

Installing browser helper objects or shell extensions

C.

Registering programs to autorun

D.

Running files from common user folders by common programs

The security team has requested that adaptive threat protection be integrated with a TIE server. Which of the following is required?

A.

Data Exchange Layer

B.

Advanced Threat Defense

C.

Event Security Manager

D.

Active Response

After installing ENS on a server, the server administrator finds that a specific application runs very slow, yet communication flows are still present. Which of the following remediation steps should the administrator take?

A.

Remove an exclusion.

B.

Create a whitelist.

C.

Create an exclusion.

D.

Remove a whitelist.