HIPs - MA0-102 Flashcards

1
Q

Which of the the following policy categories are consided to be mufti-slot policies? (Select the two that apply) A. Trusted Application B. IPS rules C. Firewall Rules D. IPS Options

A

A. Trusted Application B. IPS rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Firewall client rules are created in Adaptive Mode using which of the following parameters? A. Per-user B. Per-process C. Per-Application D. Per-signature

A

B. Per-process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is the main log file for IPS? A. FireTray.log B. HipShield log C. HipMgPlugin.log D. McTrayHip.log

A

B. HipShield log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The option to select Create Exception upon an Instrusion Event will only be available if the IPS Rules Policy has been configured with which of the following? A. Adaptive Mode B. Learn Mode C. Create Exceptions D. Allow Client Rules

A

D. Allow Client Rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What detail property includes the Local Time Zone value of a managed machine? A. Virus Scan Enterprise properties B. McAfee Agent properties C. Host Intrusion Prevention properties D. System Information properties

A

D. System Information properties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Under which HIPs Policy category can IPS Engines be disabled for troubleshooting? A. IPS Options B. Firewall Rules C. Trusted Applications (All Platforms) D. Client UI (Windows)

A

D. Client UI (Windows)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is the HIPs executable for the HIPs Client UI? A. Fire Svc.exe B. FireTray.exe C. McAfeeFire.exe D.Mfefire.exe

A

C. McAfeeFire.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following are used to create custom signatures? (Select the three that apply) A. Signature Builder B. Signature Creation Wizard C.Advanced Mode D. Standard Mode E. Expert Mode

A

B. Signature Creation Wizard C.Advanced Mode D. Standard Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is a supported browser for Host IPS and ePO (Select the two that apply) A. Internet Explorer B. Firefox C. Safari D. Chrome E. Opera

A

A. Internet Explorer B. Firefox

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following server services is responsible for communication with the McAfee agent? A. Apache B. Tomcat C. SQL D. Even Parser

A

A. Apache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following are the listed signature severity levels within HIPs? (Select the four that apply) A. High B. Major C. Medium D. Minor E. Low F. Informational

A

A. High C. Medium E. Low F. Informational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following items can be found under the IPS Policy tab in the HIPs Client UI? A. IPS exceptions from ePO Policy B. Locally created IPS Client Rules C. Blocked Hosts D. Firewall traffic

A

B. Locally created IPS Client Rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following options cannot be used to define a trusted network? A. Single Address B. Address Range C. Subnet Address D. Network Protocol

A

D. Network Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Where are Host IPS custom signatures created? A. ePO console B. Host IPS client UI C. Host IPS UI D. Firewall UI

A

A. ePO console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following HIPs Client features, when enabled, allows the user to make decisions on allowing or denying traffic to the local host? A. Adaptive mode B. Listening mode C. Inherit mode D. Learn mode

A

D. Learn mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following Firewall Rule options is used to prevent undesirable traffic from accessing the network by only processing traffic that matches both the “allow rules” above the group in the Firewall rules list and the group criteria? A. Unbridged traffic B. Network quarantine C. Connection isolation D. Network seclusion

A

C. Connection isolation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following custom signature rule types are used to prevent process termination and modification? A. Files B. Hook C. Services D. Program

A

D. Program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following items can be found under the IPS Policy tab of the HIPS Policy tab of the HIPS Client UI? A. IPS exceptions from ePO Policy B. Locally created IPS Client Rules C. Blocked Hosts D. Firewall Traffic

A

B. Locally created IPS Client Rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The time period between the moment a vulnerability is identified and a patch is released is commonly referred to as the _________window. A. Vulnerability B. Time to patch C. Protection D. Threat remediation

A

B. Time to patch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following is the default location for the McAfee Agent configuration files? A. Common Framework B. System 32 C. My Documents D. Windows Temp

A

A. Common Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following is the main log file for Firewall? A. FireTray.log B. FireSvc.log C. HipMgtPlugin.log D. McTrayHip.log

A

B. FireSvc.log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The McAfee Framework Service is responsible for which of the following functions? (Select the two that apply) A. Schedule Server Tasks B. Enforce Poilicies C. Collect and Send System Properties D. Scan for Threats and Vulnerabilities E. Policy Throtting

A

B. Enforce Policies C. Collect and Send System Properties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which utility is used to help automate upgrades and maintenance tasks with third-party software that has been tasked with deploying HIPs on client computers? A. ClieniControl.exe B. fwinfo.exe C. McAfee Installation Designer D. Extension Manager

A

A. ClieniControl.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Why is it recommended to change the agent-to-server and console-to-server communication ports from their default values during installation? A. These ports are commonly subjected to malicious exploitation. B. The default values are in the common domain C. The defaults ports may already be in use inside of the network D. To avoid technical issues with port allocation

A

A. These ports are commonly subjected to malicious exploitation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of the following ClientControl utility command line argumentrs force the Firewall component to allow all traffic? A. tfwPassthru B. /fwinfo C. /execinto D. /defConfig

A

A. tfwPassthru

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

In which order are HIPs Firewall rules processed to filler incoming packets? A. Top to bottom B. Bottom to top C. Most severre rules first D. Least severe rules first

A

A. Top to bottom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which of the following is the HIPs executable for the McAfee Validation Trust Protection service? A. FireSvc.exe B. FireTray.exe C. FrameworkService.exe D. Mfevlps.exe

A

D. Mfevlps.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which of the following statements best defines the Application Protection (Shielding and Enveloping) feature? A. Applications, system registry and services are locked down against malicious activity. B. Applications are not permitted to access data, registry and services outside of their application envelope C. Applications are prevented from communicating with any undefined network services D. Applications can only hook into processes that match a specific digital signature

A

A. Applications, system registry and services are locked down against malicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What McAfee propietary protocol is used for secure communication between the McAfee Agent and server? A. IPSEC B. SPIPE C. SSL D. HTTP

A

B. SPIPE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which of the following methods utilize HIPs events? (Select the three that apply) A. Exception creation B. Health checking C. Reporting D. Alerting E. Updating

A

A. Exception creation C. Reporting D. Alerting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which component controls the schedules tasks and communicated with the commont agent1 A. Task Manager B.. McShield C. Framework Service D. Scan32exe

A

C. Framework Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which of the following is the HIPs policy the allows a generated listing of applications that are known to be safe and are allowed to perform any normal operation A. Trusted Applications Policy B. Local Applications Policy C. Safe Applications Policy D. Host Application

A

A. Trusted Applications Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which of the following HIPS features provides the ability to reuse common policy components, particularly Firewall groups and rules? A. Policy Catalog B. Host IPS Catalog C. Policy Assingment rules D. Policy Inheritance

A

B. Host IPS Catlog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which of the following extensions is required to enable IPS within HIPs? A, Host IPS Trust Validation B. Host IPS Content C. Host IPS Advanced D.Host IPS License

A

D.Host IPS License

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which of the following methods are used for Application Blocking? (Select the two that apply) A. Application Hooking B. Application Creation C. Application Usage D. Application Testing E. Application Signature

A

A. Application Hooking B. Application Creation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which of the following databases are not support in HIPs? A. MS SQL 2005 B.. MS SQL 2008 C. MS SQL 2008 R2 D.. MS SQL 2000

A

D.. MS SQL 2000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which of the following is the supported executable that is used to install HIPs for Windows? A. McAfeeHIP_ Install.msi B. McAfeeHIP_ClientSetup.exe C. McAfeeHIP_ClientSetup.msi D. McAfeeHIP_Install.exe

A

B. McAfeeHIP_ClientSetup.exe

38
Q

Which of the following HIPs client services are used for Firewall Learn Mode? A. FireSvc.exe B. FireTray.exe C. McAfeeFire.exe D.MfeFire.exe

A

C. McAfeeFire.exe

39
Q

With statefull filtering, a slate table is considered a match when which of the follwoing conditions of the packet are matched. A. Protocol, Local Address, Local Port B .Protocol, Local Address, Remote Address C. Protocol, Local Address, Local Port, Remote Address D. Protocol, Local Address, Local Port, Remote Address,Remote Port

A

D. Protocol, Local Address, Local Port, Remote Address,Remote Port

40
Q

In which of the following files are all triggered Automatic Response actions logged? A. Response log B. Server Task top C. Threat Event log D. Notification log

A

B. Server Task top

41
Q

Which of the following security level adjustments to “all clients” would be the equivalent to defining and exception valid for all clients, users and processes under a specific signature? A. Disabled B. Information C. Low D. One

A

A. Disabled

42
Q

Which of the following McAfee Agent files are used to report the results of script commands used during updates and deployment? A. McScript.log B. Agent_{SYSTEM NAME}.log C. Sitelist.xml D.Site.StatList.xml

A

A. McScript.log

43
Q

What is the update frequency for Host Intrusion Prevention signature content? A. monthly B. bi-weely C. daily D. yearly

A

A. monthly

44
Q

Which of the following steps should be performed first when troubleshooting issues with custom signatures? A. Use the Process Monitor and Process Explorer tools B. Review violations in the HipShield.log file C. Simplify violations in the HipShield.log file D. Disable the HIPS component

A

C. Simplify violations in the HipShield.log file

45
Q

Which of the following is the installation directory for HIPs non-Windows platforms? A, /opt/McAfee/hip B, /opt/McAfee/bin/hip C. /etc/bin/McAfee/hip D. /var/root/McAfee/hip

A

A. /opt/McAfee/hip

46
Q

In order to tighten a system’s intrusion prevention when using Host IPS, when should Adaptive Mode be disabled? A. Adaptive Mode should never be disabled B. Adaptive Mode should be disabled after the tuning period is over C. Adaptive Mode should be disabled during the tuning period D. Adaptive Mode should be disabled before the pilot period has begun

A

B. Adaptive Mode should be disabled after the tuning period is over

47
Q

Which of ther following platforms does Host IPS not support? A. Windows B. Solaris C. :Linux D. AIX

48
Q

Which of the following HIPs Policy categories are used to instruct the client system how to react when signatures of a specific severity are triggered? A. IPS Options (All Platforms) B. IPS Protection (All Platforms) C. IPS Rules (All Platforms) D. IPS Reactions (All Platforms)

A

B. IPS Protection (All Platforms)

49
Q

Which port is used to access tyhe McAfee Agent Activity Log from a remote machine? A. 80 B. 443 C. 8081 D. 8082

50
Q

Stateful firewalls utilize which of the following in order to keep track of the state of network connections travelling across them? A. connection cache B. product directory C. protocol inspector D. state table

A

D. state table

51
Q

Stateful packet filtering occurs at which level of the Transport Layer? A. Layer 7 and lower B. Layer 6 and lower C. Layer 5 and lower D. Layer 4 and lower

A

D. Layer 4 and lower

52
Q

Which of the following is not an available criteria for a Location Aware Group? A, DNS Server B. DHCP Server C. Default Gateway D. MAC Address

A

D. MAC Address

53
Q

In order to locally install HIPs over a previously intalled version, which of the following must be disabled? A. Firewall B. McAfee Agent Policy Enforcementg C. VSE On-Access Scanner D. IPS Protection

A

A. Firewall

54
Q

Which of the folliowing tasks provide signature updated to HIPs clients? A. McAfee Agent Update B. Host IPS Content Server C. Distributed Repository D. Repository Pull

A

A. McAfee Agent Update

55
Q

Where is Firewall traffic displayed within the HIPs Client UI? A. Activity Log lab B. Application Protection List tab C. Blocked Hosts tab D. Firewall Policy tab

A

A. Activity Log lab

56
Q

Which of the following is the command-line troubleshooting tool used for HiPs non-Windows platforms? A. fwinfo B. hipts C. s99hip D. clientcontrol

57
Q

Which of the following is the HIPs executable that provides the McAfee Firewall Core Service? A. FireSVc.exe B. FireTray.exe C. McAfeeFirej.exe D. Mfefire.exe

A

D. Mfefire.exe

58
Q

Before removing the Host IPS client, it is recommended to set the IPS Options Policy to which of the following configurations? A. On B. Off C. Adaptive D. Learn

59
Q

IPS exceptions are created in Adaptive Mode using which of the following parameters? A. IPS exceptions are created on a per-user, per-process basis B. IPS exceptions are created on a per-user, signature basis C. PS exceptions are created on a per-user, per process, per signature basis D. PS exceptions are created on a per-user, per process, per-application basis.

A

C. PS exceptions are created on a per-user, per process, per signature basis

60
Q

Which of the following HIPs Policy categories are used to set reaction for signature seventy levels? A. IPS Options B. IPS Rules C. IPS Protection D. IPS Enforcement

A

C. IPS Protection

61
Q

Which of the following HIPs Policy categories are used to set the protection reaction level for HOST IPS signature seventy levels? A. IPS Options B. IPS Rules C. IPS Protection D. IPS Enforcement

A

C. IPS Protection

62
Q

The Connection Isolation option is available for which of the following? A. New Rule B. New Group C. Firewall Options D. Startup Protection

A

B. New Group

63
Q

Under which policy category is the Application Protection List managed? A. Firewall Rules B. IPS Rules C. IPS Options D. Client UI

A

A. Firewall Rules

64
Q

Which of the following is the HIPS executable that provides Host Intrusion Prevention service? A. FireSvc.exe B. FireTray.exe C. McAfeeFire.exe D. Mfefire.exe

A

A. FireSvc.exe

65
Q

When are MPs client rule exceptions delivered to the ePO Server? A. During agent-to-server communication B. Custom Host C. Network D. Custom Network E.. Digital

A

A. During agent-to-server communication B. Custom Host C. Network

66
Q

Which of the following types of signatures can be contained within an IPS Rules Policy? (Select the three that apply) A. Host B. Custom Host C. Network D. Custom Network E. Digital

A

A. Host B. Custom Host C. Network

67
Q

Which of the following are the accepted methods of creating exceptions? (Select the two that apply? A. Evasion tool B. ClientException utility C. Manually D. Adaptive Mode E. Learn Mode

A

C. Manually D. Adaptive Mode

68
Q

When creating a User Defined signatgure, Rule Definitions can be based on which of the following critieria? A. Windows and UNIX Files and Directories B. Windows Registry Keys C. Windows Registry Hive D. Windows Services E. Windows and UNIX ports

A

A. Windows and UNIX Files and Directories B. Windows Registry Keys D. Windows Services

69
Q

When applying a patch or service pack to systems on the network, what is the recommended HIPs protection policy that is used for enforcement? A. Adaptive Mode B. Warning C. Basic Protection D. Enhanced Protection

A

B. Warning

70
Q

Which of the following are examples of client tasks? A. Agent Wakeup B. Product Update C. Repository Pull D. Mirror Repositories E. Event Migration

A

A. Agent Wakeup B. Product Update D. Mirror Repositories

71
Q

Which of the following protection is available for HIPs non-Windows clients? A. Malware Detection B. Firewall C. IPS D. Application Blocking

72
Q

Which of the following operating systems does HIPs for Windows not support? A. Windows XPSP 3 32-bit B. Windows XPSP 3 64-bit C. Windows 7 64-bit D. Windows 2008 64-bit

A

B. Windows XPSP 3 64-bit

73
Q

Which of the following options can prevent policy enforcements locally on the client? A. Open HIPS UI B. Un-lock HIPSUI C. Open VSE Console D. Un-lock VSE Console

A

B. Un-lock HIPSUI

74
Q

Which of the following statements about Adaptive Mode are correct? A. Adaptive Mode triggers IPS events B. Adaptive Mode blocks all activity C. Adaptive Mode blocks all activity except malicious exploits D. Adaptive Mode triggers IPS alerts

A

C. Adaptive Mode blocks all activity except malicious exploits

75
Q

Which of the following files is appended under each managed with disabled event information? A. EvtFiltr.ini B. Agent_Event.xml C. EvtForward.ini D. AgentEvent.log

A

A. EvtFiltr.ini

76
Q

Which preconfigured server task is used to clean up all the adaptive mode rules and catalog entries in the database? A Host IPS 8.0 Catalog Maintenance Task B Duplicate Agent GUID - clear error count C Roll Up Data (Local ePO Server) D Host IPS 8.0 Adaptive - clear error count

A

A Host IPS 8.0 Catalog Maintenance Task

77
Q

Which task provides signature updates to HIPs clients? A McAfee Agent Update B Host IPS Content Server C Distributed Repository D Repository Pull

A

A McAfee Agent Update

78
Q

What is the name of the log in which the ClientControl.exe Utility records its activities? A CC.log B ClientUtility.log C Client.log D ClientControl.log

A

D ClientControl.log

79
Q

MaxFwLogSize registry key controls the size of: A FireSvc.log B Shield.db C FireEpo.log D Except.db

A

A FireSvc.log

80
Q

The Connection Isolation option is available for which of the following? A Firewall Rule B Firewall Group C Firewall Options D Firewall Catalogs

A

B Firewall Group

81
Q

Which of the following is the command-line troubleshooting tool used for HIPS non-Windows platforms? A fwinfo B hipts C s99hip D clientcontrol

82
Q

Which of the following can be configured on the Client UI policy for non-Windows clients? A Icon display settings B Password for administrative access C Intrusion event reactions D Policy inheritance

A

B Password for administrative access

83
Q

The Trusted Networks preconfigured default policies: A Includes a list of network addresses automatically. B Can be viewed, edited and exported by the Global Administrator. C Can be applied to Windows and Linux systems. D Includes local subnets automatically.

A

D Includes local subnets automatically.

84
Q

Which signature type can be contained within an IPS Rules Policy? A Host B Digital C Custom Digital D Custom Network

85
Q

Host IPS Firewall rules are found in the: A Host IPS Firewall Rules Catalog. B Host IPS Firewall Catalog. C Host IPS Rules Catalog. D Host IPS Catalog.

A

D Host IPS Catalog.

86
Q

Where is HIPS installed on linux and solaris machines?

A

a.Opt/McAfee/hip is the path that contains the client, policy rules, troubleshooting tool, HIPS and Agent shared object modules, log directories. Source: HIPS 8.0 PG, p. 99(Linux), p. 96(Solaris)

87
Q

What is this command for: /etc/rc2.d/S99hip status?

A

a. This command checks that the Solaris client is running. Source: HIPS 8.0 PG, p. 96

88
Q
  • What is this command for: /sbin/rc2.d/S99hip stop?
A

a.Run this command to stop the HIPS client after setting IPS options to OFF and applying the policy to the client. Source: HIPS 8.0 PG, p. 96

89
Q

Where are the installation history files kept in Linux?

A

a. /opt/McAfee/etc/hip-install.log. Source: HIPS 8.0 PG, p 99.

90
Q

There are 2 server tasks for HIPS, What are they? What do they do?

A
  1. Host IPS 8.0 Catalog Maintenance Task. Cleans up all the adaptive mode rules and catalog entries in the database. No configuration needed. Source ePO Menu | Automation | Server Tasks, Edit
  2. Host IPS 8.0 Property Translator. Tranlates client rule properties and populates appropriate database tables with this data. No configuration needed. Source ePO Menu | Automation | Server Tasks, Edit
92
Q

Where are the HIPShield.log and HIPClient.log files found in linux?

A

a. McAfee/hip/log.Source HIPS 8.0 PG, p.99