Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free McAfee MA0-107 Practice Exam with Questions & Answers

Questions 1

A user navigates to a new website that has not been rated by ENS Web Control yet. In which of the following ways will ENS Web Control handle this request by default?

Options:
A.

Delete

B.

Block

C.

Allow

D.

Warn

McAfee MA0-107 Premium Access
Questions 2

Which of the following describes the role of a cloud-based Real Protect scanner?

Options:
A.

It sends environmental variables to the cloud for analysis.

B.

It sends potentially malicious code to the cloud for analysis.

C.

It sends behavior information to the cloud for analysis.

D.

It sends personally identifiable information to the cloud for analysis.

Questions 3

After enabling a timed group in the firewall policy, in which of the following ways does the user enable the group?

Options:
A.

Moving the mouse to the upper-right corner of the screen

B.

Running MFEtime.exe from the start menu

C.

From the McAfee system tray icon

D.

Inside the ENS console

Questions 4

A security technician is configuring the exploit prevention policy. Based on best practices for critical servers, which of the following severity levels should the technician configure signatures to block after a requisite period of tuning?

Options:
A.

Low

B.

High

C.

Informational

D.

Medium

Questions 5

When presented with a file-reputation response prompt, which of the following should a user select when responding to the file-reputation prompt to prevent future prompting for the same file type?

Options:
A.

Do not show this prompt again.

B.

Remember this decision.

C.

Allow this selection.

D.

Whitelist this selection.

Questions 6

By default, an individual file is flushed from the Adaptive Threat Protection local reputation cache every:

Options:
A.

7 days.

B.

14 days.

C.

30 days.

D.

60 days.

Questions 7

Which of the following groups of legacy products can be migrated to ENS 10.5?

Options:
A.

VirusScan Enterprise, Host Intrusion Prevention, and SiteAdvisor Enterprise

B.

Host Intrusion Prevention, SiteAdvisor Enterprise, and Data Loss Prevention

C.

VirusScan Enterprise, Host Intrusion Prevention, and Data Loss Prevention

D.

Host Intrusion Prevention, SiteAdvisor Enterprise, and Application Control

Questions 8

Which of the following describes the difference in functionality between Real Protect cloud-based and Real Protect client-based?

Options:
A.

The location where the centralized management server and policies are managed

B.

The location from which AMCore content updates are pulled before on-demand scans

C.

The location where the scanning is conducted on file attributes and behavior

D.

The location where malware is quarantined on the managed system

Questions 9

The ePO administrators have already tuned and configured dynamic application containment rules within the policy. In which of the following ways will dynamic application containment protect against malware once enforcement is enabled?

Options:
A.

The scan engine will learn the behavior of the application and send up to GT1 for analysis, and then receive an action to block all actions from the application's process.

B.

If an application's reputation is below the threshold while triggering a block rule and is not an excluded application, malicious behavior of the application will be contained.

C.

The ENS client will receive the reputation as "highly suspicious" from either the McAfee GTI or TIE server, and then immediately uninstall the application on the system.

D.

The adaptive threat protection scanner will send the file automatically to a preconfigured "Sandbox" folder and analyze the application for malicious features before use.

Questions 10

An ePO administrator wants to configure system utilization for on-demand scanning to conform to best-practice recommendations based on the ENS Product Guide. To do this, the administrator should:

Options:
A.

set system utilization to "Normal" for systems with end-user activity and "Low" for systems with large volumes/little end-user activity.

B.

set system utilization to "Low" for systems with end-user activity and "Normal" for systems with large volumes/little end-user activity.

C.

set system utilization to "Low" for systems with end-user activity and "Low" for systems with large volumes/little end-user activity.

D.

set system utilization to "Below Normal" for systems with end-user activity and "Normal" for systems with large volumes/little end-user activity.