Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

MA0-107 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

MA0-107 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: McAfee Certified Product Specialist - ENS
  • Last Update: May 18, 2024
  • Questions and Answers: 70
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

MA0-107 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

MA0-107 Practice Exam Questions with Answers McAfee Certified Product Specialist - ENS Certification

Question # 6

Organizational security policy requires a host-based firewall on endpoints. Some endpoints have applications where documentation depicting network traffic flows is not readily available. Which of the following ENS 10.5 firewall features should be used to develop rules for their firewall policy?

A.

Location-aware Groups

B.

Trusted Networks

C.

Trusted Executables

D.

Adaptive Mode

Full Access
Question # 7

An administrator wants to exclude folder ABC on various drives. In which of the following ways should the administrator list the exclusion in the policy?

A.

??\ABC

B.

**\ABC

C.

***\ABC

D.

???\ABC

Full Access
Question # 8

A user is reporting a functional issue with the ENS client. Which of the following logs should be checked?

A.

ExploitPrevention_Debug.log

B.

OnDemandScan_Debug.log

C.

EndpointSecurityPlatform_Errors.log

D.

AdaptiveThreatProtection_Debug.log

Full Access
Question # 9

A user goes to four different websites, each with a different rating. One of the four sites is blocked and unable to be accessed. Using default configuration to determine the rating, which of the following ratings does this site have?

A.

Gray

B.

Red

C.

Yellow

D.

Green

Full Access
Question # 10

In which of the following locations are the installation log files stored by default on a Windows machine?

A.

%TEMP%\McAfeeLogs

B.

%PROGRAMDATA%\McAfee\Logs

C.

%USERDATA%\McAfeeLogFiles

D.

%PROGRAMFILES%\CommonFiles\McAfeeLogs

Full Access
Question # 11

The security team has requested that adaptive threat protection be integrated with a TIE server. Which of the following is required?

A.

Data Exchange Layer

B.

Advanced Threat Defense

C.

Event Security Manager

D.

Active Response

Full Access
Question # 12

When configuring the Adaptive Threat Protection Options policy, which of the following is a rule assignment group that needs to be selected to accommodate an environment consisting of high-change systems with frequent installations and updates of trusted software?

A.

Adaptive

B.

Productivity

C.

Balanced

D.

Security

Full Access
Question # 13

A hospital in another county just received a new variant of ransomware that infected 70% of its systems. After learning the characteristics of this ransomware, the security team wants to implement a protection policy to stop certain files from being modified and new registry keys from being created that are relevant to the ransomware. Which of the following policies meets this requirement?

A.

Exploit prevention policy

B.

Block and allow list policy

C.

Access protection policy

D.

Firewall rules policy

Full Access
Question # 14

An administrator notices that on one endpoint, Threat Prevention is not currently on the latest version of AMContent. The administrator presses the "Update Now" button within the console, but a message shows the update was unsuccessful. Which of the following logs should the administrator look at FIRST to troubleshoot the failure?

A.

EndpointSecurityPlatform_Activity.log

B.

ThreatPrevention_Activity.bg

C.

AccessProtection_Activity.log

D.

PackageManager_Activity.log

Full Access
Question # 15

Which of the following groups of legacy products can be migrated to ENS 10.5?

A.

VirusScan Enterprise, Host Intrusion Prevention, and SiteAdvisor Enterprise

B.

Host Intrusion Prevention, SiteAdvisor Enterprise, and Data Loss Prevention

C.

VirusScan Enterprise, Host Intrusion Prevention, and Data Loss Prevention

D.

Host Intrusion Prevention, SiteAdvisor Enterprise, and Application Control

Full Access
Question # 16

A user navigates to a website and notices a small blue square around an "M" in the upper-right corner of the Chrome browser. Which of the following does the blue color indicate within the toolbar?

A.

It is an internal website.

B.

Web Control is disabled.

C.

No rating is available.

D.

It is a phishing website.

Full Access
Question # 17

A user is unable to access a website. The Web Control browser toolbar appears gray. Other websites are accessible. Which of the following features of ENS Web Control has been enabled and is causing the issue?

A.

Block links to risky sites in the search results.

B.

Block phishing pages for all sites.

C.

Block sites that are not verified by GTI.

D.

Block sites by default if the McAfee GTI ratings server is not reachable.

Full Access
Question # 18

An ENS administrator wants the end user to be able to view the web safety information. In addition to enabling Web Control, which of the following describes the requirements for this?

A.

The Web Control Plug-in site report must be enabled on the browser toolbar.

B.

Content Action settings must be configured to specify the action to apply according to the site rating.

C.

The Web Control Plug-in must be enabled in the browser, and "Warn" must be selected in Action Enforcement.

D.

The Web Control Plug-in must be enabled in the browser, and the client browser toolbar must be enabled.

Full Access
Question # 19

An ePO administrator is experiencing issues installing an ENS module on a client machine and decides to investigate by analyzing the install log. In which of the following locations will the administrator find the install log, assuming it is in its default location on the endpoint?

A.

%programdata%\mcafee\datreputation\logs

B.

**\program files\mcafee\

C.

%temp%\mcafeelogs

D.

%programdata%\mcafee\Agent\logs

Full Access
Question # 20

Which of the following components can the Endpoint Migration Assistant tool migrate?

A.

Deployment tasks

B.

Dashboards

C.

Server tasks

D.

Host IPS catalog

Full Access
Question # 21

After installing ENS on a server, the server administrator finds that a specific application runs very slow, yet communication flows are still present. Which of the following remediation steps should the administrator take?

A.

Remove an exclusion.

B.

Create a whitelist.

C.

Create an exclusion.

D.

Remove a whitelist.

Full Access