Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free McAfee MA0-103 Practice Exam with Questions & Answers

Questions 1

Which of the following protects the DLP Endpoint client from malicious interferences?

Options:
A.

Agent Watchdogs Only

B.

VirusScan Enterprise

C.

Host Intrusion Prevention System

D.

Data Access Protection module and Agent Watchdogs

McAfee MA0-103 Premium Access
Questions 2

Which of the following DLP features could be used to target suspicious activity during the first phase of an attack at the hardware layer?

Options:
A.

Removable Storage device rules

B.

Unmanageable device class

C.

File system protection rules

D.

Network communication protection rules

Questions 3

Which of the following protocols cannot be blocked or monitored by McAfee DLP 'Network Communication Protection Rules'?

Options:
A.

Secure FTP (SFTP)

B.

Secure Copy (SCP)

C.

Server Message Block/NetBIOS (SMB)

D.

Secure Shell (SSH)

Questions 4

To assist with perceived performance issues prior to product installation, the DLP End point Administrator could prepare by

Options:
A.

disabling unused modules.

B.

distributing agent override codes.

C.

establishing a system baseline.

D.

enabling the system watch dog service.

Questions 5

An employee attempts to copy sensitive data from the Oracle HR database into a Microsoft Word document. To prevent a violation of employee privacy, what actions should the administrator define in the DLPe rule?

Options:
A.

The paste should be blocked

B.

The paste should be monitored, and the employee notified

C.

The paste should be encrypted and stored pending further evaluation of the data being copied

D.

The file access protection should be blocked and the employee's system locked down

Questions 6

What is the recommended rule to block Removable Storage Devices?

Options:
A.

Plug and Play Device Rule

B.

Removable Storage Device Rule

C.

Removable Storage File Access Rule

D.

Removable Storage Protection Rule

Questions 7

What rule is used to monitor protected file transfer to network shares?

Options:
A.

Network Communication Protection Rule

B.

Network Share Protection Rule

C.

File System Protection Rule

D.

File System Discovery Rule

Questions 8

Which of the following is critical for troubleshooting system health?

Options:
A.

System log

B.

Administrator log

C.

Agent log

D.

Policy analyzer

Questions 9

There is a known virus spreading using removable media. What action should be taken to mitigate this risk?

Options:
A.

Monitor all removable media devices

B.

Enable McAfee endpoint encryption controls

C.

Block all removable media devices

D.

Make plug and play devices read only

Questions 10

Applications in which of the following groups will NOT have their Disk Activity scanned for sensitive data?

Options:
A.

Editor

B.

Archiver

C.

Installer

D.

Trusted