Halloween Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

An ePO administrator decides to define a trusted network in the firewall policy. This will result in:

A.

an inbound directional allow rule for that remote network.

B.

an outbound directional allow rule for that remote network.

C.

a bidirectional allow rule for that remote network.

D.

a bidirectional deny rule for that remote network.

Which of the following describes the difference in functionality between Real Protect cloud-based and Real Protect client-based?

A.

The location where the centralized management server and policies are managed

B.

The location from which AMCore content updates are pulled before on-demand scans

C.

The location where the scanning is conducted on file attributes and behavior

D.

The location where malware is quarantined on the managed system

An ePO administrator needs to add exclusions for a folder. The folder has been created in several locations, including C:\Program Files\Custom\Acme or C:\Program Files\Acme, but the folder could be located in other subfolders in the Program Files folder. Which of the following is the correct way to write an exclusion for the Acme folder?

A.

\Program Files\?\Acme

B.

\Program Files\**\Acme

C.

\Program Files\*\Acme

D.

\Program Files\??\Acme

Exploit prevention content is released

A.

once per month.

B.

every other week.

C.

once per quarter.

D.

every two months.

When creating an exploit prevention process exclusion, at least one identifier must be specified. Which of the following is an identifier?

A.

DEP

B.

MD5 hash

C.

API

D.

Caller module

An engineer needs to allow a specific application to run. The engineer just finished creating an Exploit Prevention process exclusion. After applying the exclusion, the engineer notices the application is not being run. The following information is provided to the engineer:

Which of the following is the error with the engineer's exclusion?

A.

A signature ID was not entered.

B.

Exclusions are case sensitive.

C.

A hash was not specified.

D.

Wildcard was not used.

Which of the following components can the Endpoint Migration Assistant tool migrate?

A.

Deployment tasks

B.

Dashboards

C.

Server tasks

D.

Host IPS catalog

A user navigates to a website and notices a small blue square around an "M" in the upper-right corner of the Chrome browser. Which of the following does the blue color indicate within the toolbar?

A.

It is an internal website.

B.

Web Control is disabled.

C.

No rating is available.

D.

It is a phishing website.

An ePO administrator is experiencing issues installing an ENS module on a client machine and decides to investigate by analyzing the install log. In which of the following locations will the administrator find the install log, assuming it is in its default location on the endpoint?

A.

%programdata%\mcafee\datreputation\logs

B.

**\program files\mcafee\

C.

%temp%\mcafeelogs

D.

%programdata%\mcafee\Agent\logs

An administrator wants to prevent incoming packets until the system reboots fully. Which of the following features should be configured to allow this?

A.

Treat McAfee GTI Match as an Intrusion

B.

Allow Bridged Traffic

C.

Allow Only Outgoing Traffic Until Firewall Services Have Started

D.

Block All Untrusted Executables