Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

An administrator is running new software, and a file is detected by the On-Access scanner as a Potentially Unwanted Program. In which of the following ways can the administrator prevent the file from being detected?

A.

Adding the process name within standard process settings

B.

Excluding by detection name

C.

Adding to Potentially Unwanted Program Detections.

D.

Configuring low-risk settings and low risk the software

Full Access
Question # 5

Which of the following fields can an ePO administrator use when creating exclusions for Dynamic Application Containment?

A.

Certificate

B.

Rule

C.

File version

D.

MD5 hash

Full Access
Question # 6

A new ENS policy has been created and deployed, and a user contacts the help desk stating that a particular site is no longer accessible. Which of the following ENS Web Control policy categories is the culprit?

A.

Options

B.

Content Actions

C.

Browser Control

D.

Enforcement Messaging

Full Access
Question # 7

Which of the following describes the difference in functionality between Real Protect cloud-based and Real Protect client-based?

A.

The location where the centralized management server and policies are managed

B.

The location from which AMCore content updates are pulled before on-demand scans

C.

The location where the scanning is conducted on file attributes and behavior

D.

The location where malware is quarantined on the managed system

Full Access
Question # 8

Which of the following methods should an administrator enable to address possible buffer overflow conditions?

A.

On-demand Scan

B.

Exploit Prevention

C.

Access Protection rules

D.

McAfee GTI feedback

Full Access
Question # 9

The ENS administrator wants to monitor remotely the modification of files, but BigFix.exe is generating many false positives. Which of the following should the ENS administrator do?

A.

Exclude the file under Threat Prevention / Access Protection / Remotely creating or modifying Files or Folders.

B.

Add the file as a High Risk Process under Threat Prevention / On Access Scan / Process settings.

C.

Exclude the file under Common Options / Self Protection.

D.

Add the file under Threat Prevention / Options/ Exclusions by detection name.

Full Access
Question # 10

A security professional is configuring ENS for a client and wants to ensure applications will be prevented from executing software locally from the browser or email client. Which of the following McAfee-defined rules should be implemented?

A.

Creating new executable files in the Windows folder

B.

Installing browser helper objects or shell extensions

C.

Registering programs to autorun

D.

Running files from common user folders by common programs

Full Access