Security operations has recently received indicators of compromise (IOCs) detailing a new piece of malware for which coverage is not available. The threat advisory recommends a list of file paths and registry keys to prevent this new malware from successfully executing. Which of the following ENS 10.5 features should be used to achieve this goal?
While tuning the firewall policy, the ePO administrator notices unauthorized traffic is being initiated by a file transfer utility application. If this is a recently approved application, in which of the following locations should this be configured to allow FTP traffic only with this application?
The ENS administrator wants to monitor remotely the modification of files, but BigFix.exe is generating many false positives. Which of the following should the ENS administrator do?
An administrator suspects that Self Protection is preventing local installation of a patch. Which of the following log levels should the administrator review?
Which of the following describes the role of a cloud-based Real Protect scanner?
The ePO administrator sees the ENS firewall has been disabled on an endpoint in ePO. The end user states that no changes were made to the McAfee products on the endpoint in question. Which of the following questions should the administrator ask the end user about the McAfee icon to validate that the ENS firewall might be disabled?
An ENS administrator wants to dynamically create firewall rules required for the environment. In Enable Firewall Policies/Options, which of the following should be utilized?
An administrator notices that on one endpoint, Threat Prevention is not currently on the latest version of AMContent. The administrator presses the " Update Now " button within the console, but a message shows the update was unsuccessful. Which of the following logs should the administrator look at FIRST to troubleshoot the failure?
A user is reporting a functional issue with the ENS client. Which of the following logs should be checked?
If the ePO server ' s access to the Internet is allowed, which of the following options would the administrator have to check in the McAfee ENS Migration Assistant extension?
In Web Control, " Enable Web Category blocking of restricted content " is enforced. Which of the following describes the result if a user enters a restricted site?
In which of the following locations are the installation log files stored by default on a Windows machine?
When presented with a file-reputation response prompt, which of the following should a user select when responding to the file-reputation prompt to prevent future prompting for the same file type?
A security technician is configuring the exploit prevention policy. Based on best practices for critical servers, which of the following severity levels should the technician configure signatures to block after a requisite period of tuning?
In which of the following ways does Dynamic App Containment protect against malware?
An ePO administrator needs to add exclusions for a folder. The folder has been created in several locations, including C:\Program Files\Custom\Acme or C:\Program Files\Acme, but the folder could be located in other subfolders in the Program Files folder. Which of the following is the correct way to write an exclusion for the Acme folder?
Dynamic Application Containment uses which of the following attributes of an executable to provide advanced protection?