An ENS administrator wants the end user to be able to view the web safety information. In addition to enabling Web Control, which of the following describes the requirements for this?
A. The Web Control Plug-in site report must be enabled on the browser toolbar.
B. Content Action settings must be configured to specify the action to apply according to the site rating.
C. The Web Control Plug-in must be enabled in the browser, and "Warn" must be selected in Action Enforcement.
D. The Web Control Plug-in must be enabled in the browser, and the client browser toolbar must be
enabled.
Which of the following items are sent to the cloud when Real Protect scanning is enabled on endpoints that are connected to the Internet?
A. System information
B. Running process
C. Behavioral information
D. File reputation
If the ePO server's access to the Internet is allowed, which of the following options would the administrator have to check in the McAfee ENS Migration Assistant extension?
A. Software Manager
B. Server Client Package Install
C. Master Repository
D. Workstation Client Package Install
An administrator wants to allow remote users the ability to access the Internet from unsecure WiFi access points to connect to the VPN. Which of the following ENS 10.5 features should the administrator use to accomplish this?
A. Trusted Networks
B. Location-based Groups
C. Timed Groups
D. Connection Isolation Groups
Which of the following components can the Endpoint Migration Assistant tool migrate?
A. Deployment tasks
B. Dashboards
C. Server tasks
D. Host IPS catalog
A security technician is configuring the exploit prevention policy. Based on best practices for critical servers, which of the following severity levels should the technician configure signatures to block after a requisite period of tuning?
A. Low
B. High
C. Informational
D. Medium
Which of the following fields can an ePO administrator use when creating exclusions for Dynamic Application Containment?
A. Certificate
B. Rule
C. File version
D. MD5 hash
For which of the following reasons does ENS 10 store two previous versions of AMCore content?
A. To allow for content rollback if it is needed
B. To allow for comparison of detections between content versions
C. To allow for backup when an Extra.DAT is deployed
D. To allow for choice of which content to scan a file against
The security team has requested that adaptive threat protection be integrated with a TIE server. Which of the following is required?
A. Data Exchange Layer
B. Advanced Threat Defense
C. Event Security Manager
D. Active Response
On Windows 8 and 10 machines, Windows places a flag in the tile of an app, causing Windows to notify the user of a problem and directing the user to the Windows Store to reinstall. This flag is placed on the tile when the Threat Prevention scanner detects a threat in the path of an installed Windows Store app, and marks the application as:
A. malicious.
B. suspicious.
C. questionable.
D. tampered.