Host Based Security System Flashcards

1
Q

HBSS utilizes a pull-system, what type of architecture is this?

A

client-server architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 3 components of HBSS?

A
  • Database
  • ePO Server
  • Endpoint
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The Master Agent Handler is controlled by which HBSS component?

A

ePO Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What distributes network traffic generated by agent-server communication by directing managed systems or groups of systems to report back.

A

Agent Handlers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The Master Repository falls under which HBSS component?

A

ePO Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

(T/F) The Master Repository manages policies, collects events, and installs code on the clients.

A

False. A repository is nothing more than a file share located in your environment that your clients can access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the client-side component providing secure communication between McAfee ePO and managed products?

A

McAfee Agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(T/F) In an environment with less than 10,000 endpoints, there is no need for a dedicated SQL database, Agent Handlers, or repositories.

A

True.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

At what point should an organization have a seperate SQL server, separate Agent Handler and properly placed repositories?

A

When they have 75K to 150K+ endpoints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What components are on the McAfee Agent?

A
  • Virus Scan Enterprise
  • Host Intrusion Prevention
  • Rogue System Detection
  • Policy Auditor
  • Data Loss Prevention
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In relation to the Virus Scan Enterprise, what is the difference between On-Access and On-Demand scans?

A

The On-Access scanner examines files on your computer as they are accessed.

The On-Demand scanner examines all parts of your computer for potential threats, at convenient times or at regular intervals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What provides heuristic detection capability for suspicious files?

A

Artemis Alerts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which type of virus scan hooks into the system at the lowest levels, scanning files where they first enter the system?

A

On-Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What in HBSS utilizes a combination of passive and active enumeration techniques to detect systems that are not under the protection of HBSS?

A

RSD (Rogue System Detection) Agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What can control data from entering or leaving the network and can protect against loss from the following:

  • Clipboard software
  • Cloud applications
  • Email (including email sent to mobile devices)
  • Network shares
  • Printers
  • Screen captures
  • Specified applications and browsers
  • Web posts
A

DLP (Data Loss Prevention) Agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What allows users to import and export benchmarks and checks that use SCAP?

A

Policy Auditor