Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free McAfee MA0-107 Practice Exam with Questions & Answers | Set: 2

Questions 11

While tuning the firewall policy, the ePO administrator notices unauthorized traffic is being initiated by a file transfer utility application. If this is a recently approved application, in which of the following locations should this be configured to allow FTP traffic only with this application?

Options:
A.

Add a new rule within the Access Protection policy to block port 21 and exclude the executable for the software.

B.

Put a new rule in the Exploit Prevention policy to include the executable for the software for additional protection.

C.

Exclude the process associated with the software within the On Access Scan policy's Low-Risk Processes section.

D.

Create an allow rule within the Rules policy for inbound/outbound on port 21 and the executable for the software.

McAfee MA0-107 Premium Access
Questions 12

A hospital in another county just received a new variant of ransomware that infected 70% of its systems. After learning the characteristics of this ransomware, the security team wants to implement a protection policy to stop certain files from being modified and new registry keys from being created that are relevant to the ransomware. Which of the following policies meets this requirement?

Options:
A.

Exploit prevention policy

B.

Block and allow list policy

C.

Access protection policy

D.

Firewall rules policy

Questions 13

Joe, an administrator, runs a policy-based, on-demand scan on a system and notices that after the scan, a threat event was created for what appears to be a false positive. Joe wants to submit the file for analysis to McAfee Labs; but every time he accesses the file, it is detected. In which of the following default locations can Joe find the backups of the detected files?

Options:
A.

%ProgramData%\McAfee\Common Framework\AgentEvents

B.

C:\Quarantine

C.

C:\Windows\Temp\Quarantine

D.

%deflogfir%\Quarantine

Questions 14

An ePO administrator needs to add exclusions for a folder. The folder has been created in several locations, including C:\Program Files\Custom\Acme or C:\Program Files\Acme, but the folder could be located in other subfolders in the Program Files folder. Which of the following is the correct way to write an exclusion for the Acme folder?

Options:
A.

\Program Files\?\Acme

B.

\Program Files\**\Acme

C.

\Program Files\*\Acme

D.

\Program Files\??\Acme

Questions 15

A company's security posture requires the ENS firewall to be enabled; however, the team is unsure of communication flows in the environment. In which of the following modes should the ePO administrator deploy the firewall policy to achieve flow awareness?

Options:
A.

Adaptive Mode

B.

Interface Mode

C.

Enforce Mode

D.

Observe Mode

Questions 16

Which of the following server roles has a McAfee-defined policy bundled with the product?

Options:
A.

Exchange

B.

Internet Information Services (IIS)

C.

Active Directory

D.

SQL

Questions 17

An IT department is looking for a way to optimize performance with on-access scanning. To maximize security and minimize the impact on the system, on-access scanning should be configured to scan files at which of the following frequencies?

Options:
A.

Disable on-access scanning.

B.

Let McAfee decide.

C.

Only scan files on write.

D.

Only scan files on read.

Questions 18

An ENS administrator wants the end user to be able to view the web safety information. In addition to enabling Web Control, which of the following describes the requirements for this?

Options:
A.

The Web Control Plug-in site report must be enabled on the browser toolbar.

B.

Content Action settings must be configured to specify the action to apply according to the site rating.

C.

The Web Control Plug-in must be enabled in the browser, and "Warn" must be selected in Action Enforcement.

D.

The Web Control Plug-in must be enabled in the browser, and the client browser toolbar must be enabled.

Questions 19

Which of the following is the benefit of a TIE server with regard to the Adaptive Threat Protection module?

Options:
A.

It communicates with McAfee GTI for file and certificate reputation for malicious code.

B.

It is required, and the Adaptive Threat Protection will only work with the TIE server.

C.

The Threat Protection cache flushes when the reputation rules change.

D.

The stored file and certificate reputations are locally stored, making the remediation automatically quicker.

Questions 20

An administrator suspects that Self Protection is preventing local installation of a patch. Which of the following log levels should the administrator review?

Options:
A.

Event logging

B.

Debug logging

C.

Activity logging

D.

High severity logging