ENS Flashcards
When an unknown file is discovered by Adaptive Threat Protection, which of the following is the correct order of processes that the file hash is evaluated?
a. McAfee GTI, TIE Server, Local Reputation Cache
b. TIE Server, McAfee GTI, Local Reputation Cache
c. TIE Server, Local Reputation Cache, McAfee GTI
d. Local Reputation Cache; TIE Server, McAfee GTI
Local Reputation Cache; TIE Server, McAfee GTI
An ePO administrator has deployed Web Control to the environment, but has not configured any of the settings. Which of the following actions would, by default, happen if a user accesses a site that has not been rated by McAfee?
a. The user will be allowed to access the site with no notifications.
b. The user will be prompted to enter an explanation for why they want to see the site.
c. The user will be blocked from accessing the unknown site.
d. The user will see a warning message will appear first, then access will be granted.
The user will be allowed to access the site with no notifications.
Which of the following is true regarding Disaster Recovery?
a. Admin added
b. User added
c. Adaptive added
d. Learning added
User added
The incident response team would like to block bittorrent.exe, but allow it to run from an authorized location on Windows systems. Which of the following will meet this requirement?
a. Within the Threat Prevention Options policy, add the executable to the Potentially Unwanted Program Detections, and add the excluded path within the low-risk exclusion section of the policy.
b. Select “All Files” within the “What to Scan” section of the Threat Prevention On-Access Scan policy, and then include the allowed path to the exclusions section of the policy.
c. Add the executable as a high-risk process within the Threat Prevention On-Access Scan policy, and then include the allowed path within the high-risk exclusions section of the policy.
d. Configure a file or folder path that includes the specified process within the Threat Prevention On-Demand Scan policy, and add the authorized path to the exclusions section of the policy.
Within the Threat Prevention Options policy, add the executable to the Potentially Unwanted Program Detections, and add the excluded path within the low-risk exclusion section of the policy.
Which ENS module checks for viruses, spyware, potentially unwanted programs, and other threats by scanning items?
a. Firewall
b. Adaptive Threat Prevention
c. Threat Prevention
d. Web Control
Threat Prevention
Which ENS module acts as a filter between and endpoint computer an the network or the Internet?
a. Firewall
b. Adaptive Threat Protection
c. Threat Prevention
d. Web Control
Firewall
Which ENS module displays safety ratings and reports for websites during online browsing and web searching?
a. Firewall
b. Adaptive Threat Protection
c. Threat Prevention
d. Web Control
Web Control
What optional ENS module analyzes content from your enterprise and decides what to do based on file reputation, rules, and reputation thresholds?
a. Firewall
b. Adaptive Threat Protection
c. Threat Prevention
d. Web Control
Adaptive Threat Protection
In which type of ENS deployment will the administrator install product components on the management server, configure features settings, and then deploy the client software to multiple managed systems using deployment client tasks?
a. ePO Cloud deployment
b. Self-managed System deployment
c. ePO On-premises deployment
d. Endpoint Migration Assistant deployment
ePO On-premises deployment
In which type of ENS deployment will the end user perform the installation tasks on the client systems using the installation wizard?
a. Endpoint Migration Assistant deployment
b. ePO Cloud deployment
c. Self-managed System deployment
d. ePO On-premises deployment
Self-managed System deployment
What is the recommended version of McAfee Agent that should be installed on the endpoint systems prior to the installation of ENS 10.5?
a. MA 5.0.2.333
b. MA 4.8
c. MA 6.0.2
d. MA 5.0.4
MA 5.0.4
When performing a migration to ENS using the Endpoint Migration Assistant, which two options are available? (Choose 2)
a. Restore all setting to default before migration
b. Remove legacy products prior to migration
c. Select and configure settings and assignments manually
d. Migrate all setting and assignments automatically based on current settings
Select and configure settings and assignments manually
Migrate all setting and assignments automatically based on current settings
What type of migration is recommended for a large network with more than 250 managed systems and complex settings?
a. Automatic Migration
b. Hybrid Migration
c. Policy Migration
d. Manual Migration
Manual Migration
When setting Common Settings on the ENS client what options are available for the Client Interface mode? (Choose 3)
a. Full Access
b. Limited Access
c. Lock client interface
d. Standard Access
Full Access
Lock client interface
Standard Access
When configuring Common Tasks on the ENS client, which three McAfee-defined tasks are created by default? (Choose 3)
a. Default Client Update
b. Mirror
c. Full Scan
d. Quick Scan
Default Client Update
Full Scan
Quick Scan
When Configuring the Threat Prevention module on the ENS client, what type of scan would you configure to perform a thorough check of all areas of the system?
a. On-Access Scan
b. Script Scan
c. Full Scan
d. Quick Scan
Full Scan
When configuring the Threat Prevention module on the ENS client, what feature can be enabled to prevent unwanted changes to managed computers by restricting access to specified files, shares, and registry keys, registry values, processes, and services?
a. Access Protection
b. Exploit Prevention
c. On-Access Scan
d. On-Demand Scan
Access Protection
When configuring the Threat Prevention module on the ENS client, what feature can be enabled to stop exploited buffer overflows from executing arbitrary code?
a. Exploit Prevention
b. On-Access Scan
c. On-Demand Scan
d. Access Protection
Exploit Prevention
When configuring Firewall rules on the ENS client, what can be created to organize the rules for easier management?
a. Firewall tuning options
b. Stateful Firewall
c. Firewall protection options
d. Firewall rule groups
Firewall rule groups
When configuring Firewall rules on the ENS client, what two actions can a Firewall rule perform? (Choose 2)
a. Allow
b. Block
c. Report
d. Block and Report
Allow
Block
What options are available for a user when Web Control displays a Warning that notifies the user of potential dangers associated with the site? (Choose 2)
a. Cancel
b. Report
c. Rescan
d. Continue
Cancel
Continue
When configuring the Web Control module in the ENS client, when configuring the Rating Actions for sites, what options are available for Unrated web sites? (Choose 3)
a. Block and Report
b. Report
c. Allow
d. Warn
e. Block
Allow
Warn
Block
How is the ENS Adaptive Threat Protection module deployed in the customer’s network environment?
a. Adaptive Threat Protection is installed by default with the ENS software bundle
b. Adaptive Threat Protection must be selected when configuring the ENS installation
c. Adaptive Threat Protection is installed with the McAfee Threat Intelligence Exchange server
d. A separate Adaptive Threat Protection extension and package is added to the ePO server and deployed to the managed endpoints
A separate Adaptive Threat Protection extension and package is added to the ePO server and deployed to the managed endpoints
Which Adaptive Threat Protection component enables you to specify that applications with specific reputations run contained based on a configurable reputation threshold?
a. Exclusion Check
b. Real Protect Cloud Scan
c. Dynamic Application Containment
d. Reputation Scan
e. Real Protect Client Scan
Dynamic Application Containment