Labour Day Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > McAfee > McAfee Certified Product Specialist > MA0-107

MA0-107 McAfee Certified Product Specialist - ENS Question and Answers

Question # 4

An administrator wants to add executables that are monitored with the Exploit Prevention engine. To which of the following policy sections should the executables be added?

A.

Generic privilege escalation prevention

B.

Exclusions

C.

Signatures

D.

Application protection rules

Full Access
Question # 5

In which of the following locations are the installation log files stored by default on a Windows machine?

A.

%TEMP%\McAfeeLogs

B.

%PROGRAMDATA%\McAfee\Logs

C.

%USERDATA%\McAfeeLogFiles

D.

%PROGRAMFILES%\CommonFiles\McAfeeLogs

Full Access
Question # 6

The organization's desktop engineering team wants to include ENS 10 within their desktop imaging process. They would like to install all modules silently. Which of the following is the correct command-line syntax to accomplish this task?

A.

setupEP.exe ADDLOCAL="all" /qb!

B.

setupEP.exe ADDLOCAL="all" /qn

C.

setupEP.exe ADDLOCAL="fw,tp,wc" /qb!

D.

setupEP.exe ADDLOCAL="fw,tp,wc" /qn

Full Access
Question # 7

In which of the following ways does Dynamic App Containment protect against malware?

A.

It checks for spyware, unwanted programs, and viruses based on known patterns.

B.

It monitors communication between the computer and the network.

C.

It detects malicious files and activities using machine-learning techniques.

D.

It limits the actions unknown applications can take on the end system.

Full Access
Question # 8

Which of the following groups of legacy products can be migrated to ENS 10.5?

A.

VirusScan Enterprise, Host Intrusion Prevention, and SiteAdvisor Enterprise

B.

Host Intrusion Prevention, SiteAdvisor Enterprise, and Data Loss Prevention

C.

VirusScan Enterprise, Host Intrusion Prevention, and Data Loss Prevention

D.

Host Intrusion Prevention, SiteAdvisor Enterprise, and Application Control

Full Access
Question # 9

Organizational security policy requires a host-based firewall on endpoints. Some endpoints have applications where documentation depicting network traffic flows is not readily available. Which of the following ENS 10.5 firewall features should be used to develop rules for their firewall policy?

A.

Location-aware Groups

B.

Trusted Networks

C.

Trusted Executables

D.

Adaptive Mode

Full Access
Question # 10

Which of the following is the MAIN benefit of using Threat Intelligence Exchange (TIE) and Data Exchange Layer (DXL)?

A.

They enable centralized management of adaptive-threat-protection policies.

B.

They store and pass file reputation to managed endpoints and McAfee products.

C.

They distribute signature-based content to managed systems.

D.

They conduct scanning of files on managed systems for threats.

Full Access