New Year Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free McAfee MA0-101 Practice Exam with Questions & Answers

Questions 1

As a recommended best practice, what is the total number of sensors that should be managed through a single Network Security Manager installation?

Options:
A.

25

B.

50

C.

75

D.

100

McAfee MA0-101 Premium Access
Questions 2

Which type of NAC configuration allows a host to be subjected to both DHCP and IBAC based NAC when configured on different ports?

Options:
A.

Integrated

B.

DHCP

C.

Health-based

D.

Hybrid

Questions 3

Which server type needs to be configured as a requirement before the Quarantined user classes and Quarantined DHCP server(s) are configured?

Options:
A.

Integrated DHCP server

B.

Wildcard DNS server

C.

WINS server

D.

Portal server

Questions 4

Which of the following information is unique to Host Intrusion Prevention alerts? (Choose three)

Options:
A.

Destination IP

B.

User

C.

Source IP

D.

Agent IP

E.

Agent name

Questions 5

What is the command to enable the sensor to forward all traffic at Layer 2 if a failure occurs?

Options:
A.

Layer2 mode off

B.

Layer2modeon

C.

Layer2 mode assert

D.

Layer2 mode deassert

Questions 6

Setting a threshold to allow an IPS to react when traffic volume exceeds the set limit is an example of what type of detection method?

Options:
A.

Signature based

B.

Pattern matching

C.

Denial of Service

D.

Remediation

Questions 7

DoS detection is implemented in which of the following modes? (Choose two)

Options:
A.

Learning mode

B.

Configuration mode

C.

Threshold mode

D.

Bidirectional mode

E.

Inbound mode

Questions 8

Which logs are used to determine who was logged into the Manager the last time a signature set update was pushed from the Manager to the Sensor?

Options:
A.

Trace log

B.

Fault log

C.

Manager ems log

D.

User Activity Audit log

Questions 9

Which mode needs to be set to redirect an unmanaged system to the guest portal?

Options:
A.

Audit

B.

Simulation

C.

Enforcement

D.

Prevention

Questions 10

Which of the following are the methods used by NSP to recognize and react to Denial-of-Service (DoS) attacks? (Choose three)

Options:
A.

Blocking

B.

Shutting down the sensor

C.

Thresholds

D.

Self-learning

E.

Logging

F.

DDoS attack tool with exploit signatures