Labour Day - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

MA0-107 Questions and Answers

Question # 6

An ENS administrator is configuring on-access protection but finds the trusted backup tool is causing an unneeded performance impact. Which of the following actions should the administrator take?

A.

Endpoint Security Threat Prevention Policy Category / Threat Prevention Policy Category / Access Protection / Exclusion / Exclude the Backup Tool executable

B.

Endpoint Security Threat Prevention Policy Category / Exploit Prevention/Exclusions / Exclude Backup Tool executable

C.

Endpoint Security Threat Prevention Policy Category / On Access scan / Process Settings / Low Risk Processes / Exclude Backup Tool executable

D.

Enable McAfee GTI Feedback under Endpoint Security Threat Prevention Policy Category / Options / Proactive Data Analysis

Full Access
Question # 7

An ENS administrator wants the end user to be able to view the web safety information. In addition to enabling Web Control, which of the following describes the requirements for this?

A.

The Web Control Plug-in site report must be enabled on the browser toolbar.

B.

Content Action settings must be configured to specify the action to apply according to the site rating.

C.

The Web Control Plug-in must be enabled in the browser, and "Warn" must be selected in Action Enforcement.

D.

The Web Control Plug-in must be enabled in the browser, and the client browser toolbar must be enabled.

Full Access
Question # 8

A security professional is configuring ENS for a client and wants to ensure applications will be prevented from executing software locally from the browser or email client. Which of the following McAfee-defined rules should be implemented?

A.

Creating new executable files in the Windows folder

B.

Installing browser helper objects or shell extensions

C.

Registering programs to autorun

D.

Running files from common user folders by common programs

Full Access
Question # 9

A company's security posture requires the ENS firewall to be enabled; however, the team is unsure of communication flows in the environment. In which of the following modes should the ePO administrator deploy the firewall policy to achieve flow awareness?

A.

Adaptive Mode

B.

Interface Mode

C.

Enforce Mode

D.

Observe Mode

Full Access
Question # 10

Which of the following is the MAIN benefit of using Threat Intelligence Exchange (TIE) and Data Exchange Layer (DXL)?

A.

They enable centralized management of adaptive-threat-protection policies.

B.

They store and pass file reputation to managed endpoints and McAfee products.

C.

They distribute signature-based content to managed systems.

D.

They conduct scanning of files on managed systems for threats.

Full Access