HIPs - MA0-102 Flashcards
Which of the the following policy categories are consided to be mufti-slot policies? (Select the two that apply) A. Trusted Application B. IPS rules C. Firewall Rules D. IPS Options
A. Trusted Application B. IPS rules
Firewall client rules are created in Adaptive Mode using which of the following parameters? A. Per-user B. Per-process C. Per-Application D. Per-signature
B. Per-process
Which of the following is the main log file for IPS? A. FireTray.log B. HipShield log C. HipMgPlugin.log D. McTrayHip.log
B. HipShield log
The option to select Create Exception upon an Instrusion Event will only be available if the IPS Rules Policy has been configured with which of the following? A. Adaptive Mode B. Learn Mode C. Create Exceptions D. Allow Client Rules
D. Allow Client Rules
What detail property includes the Local Time Zone value of a managed machine? A. Virus Scan Enterprise properties B. McAfee Agent properties C. Host Intrusion Prevention properties D. System Information properties
D. System Information properties
Under which HIPs Policy category can IPS Engines be disabled for troubleshooting? A. IPS Options B. Firewall Rules C. Trusted Applications (All Platforms) D. Client UI (Windows)
D. Client UI (Windows)
Which of the following is the HIPs executable for the HIPs Client UI? A. Fire Svc.exe B. FireTray.exe C. McAfeeFire.exe D.Mfefire.exe
C. McAfeeFire.exe
Which of the following are used to create custom signatures? (Select the three that apply) A. Signature Builder B. Signature Creation Wizard C.Advanced Mode D. Standard Mode E. Expert Mode
B. Signature Creation Wizard C.Advanced Mode D. Standard Mode
Which of the following is a supported browser for Host IPS and ePO (Select the two that apply) A. Internet Explorer B. Firefox C. Safari D. Chrome E. Opera
A. Internet Explorer B. Firefox
Which of the following server services is responsible for communication with the McAfee agent? A. Apache B. Tomcat C. SQL D. Even Parser
A. Apache
Which of the following are the listed signature severity levels within HIPs? (Select the four that apply) A. High B. Major C. Medium D. Minor E. Low F. Informational
A. High C. Medium E. Low F. Informational
Which of the following items can be found under the IPS Policy tab in the HIPs Client UI? A. IPS exceptions from ePO Policy B. Locally created IPS Client Rules C. Blocked Hosts D. Firewall traffic
B. Locally created IPS Client Rules
Which of the following options cannot be used to define a trusted network? A. Single Address B. Address Range C. Subnet Address D. Network Protocol
D. Network Protocol
Where are Host IPS custom signatures created? A. ePO console B. Host IPS client UI C. Host IPS UI D. Firewall UI
A. ePO console
Which of the following HIPs Client features, when enabled, allows the user to make decisions on allowing or denying traffic to the local host? A. Adaptive mode B. Listening mode C. Inherit mode D. Learn mode
D. Learn mode
Which of the following Firewall Rule options is used to prevent undesirable traffic from accessing the network by only processing traffic that matches both the “allow rules” above the group in the Firewall rules list and the group criteria? A. Unbridged traffic B. Network quarantine C. Connection isolation D. Network seclusion
C. Connection isolation
Which of the following custom signature rule types are used to prevent process termination and modification? A. Files B. Hook C. Services D. Program
D. Program
Which of the following items can be found under the IPS Policy tab of the HIPS Policy tab of the HIPS Client UI? A. IPS exceptions from ePO Policy B. Locally created IPS Client Rules C. Blocked Hosts D. Firewall Traffic
B. Locally created IPS Client Rules
The time period between the moment a vulnerability is identified and a patch is released is commonly referred to as the _________window. A. Vulnerability B. Time to patch C. Protection D. Threat remediation
B. Time to patch
Which of the following is the default location for the McAfee Agent configuration files? A. Common Framework B. System 32 C. My Documents D. Windows Temp
A. Common Framework
Which of the following is the main log file for Firewall? A. FireTray.log B. FireSvc.log C. HipMgtPlugin.log D. McTrayHip.log
B. FireSvc.log
The McAfee Framework Service is responsible for which of the following functions? (Select the two that apply) A. Schedule Server Tasks B. Enforce Poilicies C. Collect and Send System Properties D. Scan for Threats and Vulnerabilities E. Policy Throtting
B. Enforce Policies C. Collect and Send System Properties
Which utility is used to help automate upgrades and maintenance tasks with third-party software that has been tasked with deploying HIPs on client computers? A. ClieniControl.exe B. fwinfo.exe C. McAfee Installation Designer D. Extension Manager
A. ClieniControl.exe
Why is it recommended to change the agent-to-server and console-to-server communication ports from their default values during installation? A. These ports are commonly subjected to malicious exploitation. B. The default values are in the common domain C. The defaults ports may already be in use inside of the network D. To avoid technical issues with port allocation
A. These ports are commonly subjected to malicious exploitation.