Exam Details

  • Exam Code
    :MA0-107
  • Exam Name
    :McAfee Certified Product Specialist - ENS
  • Certification
    :McAfee Certified Product Specialist
  • Vendor
    :McAfee
  • Total Questions
    :70 Q&As
  • Last Updated
    :May 12, 2024

McAfee McAfee Certified Product Specialist MA0-107 Questions & Answers

  • Question 61:

    An ENS administrator wants the end user to be able to view the web safety information. In addition to enabling Web Control, which of the following describes the requirements for this?

    A. The Web Control Plug-in site report must be enabled on the browser toolbar.

    B. Content Action settings must be configured to specify the action to apply according to the site rating.

    C. The Web Control Plug-in must be enabled in the browser, and "Warn" must be selected in Action Enforcement.

    D. The Web Control Plug-in must be enabled in the browser, and the client browser toolbar must be

    enabled.

  • Question 62:

    A company's security posture requires the ENS firewall to be enabled; however, the team is unsure of communication flows in the environment. In which of the following modes should the ePO administrator deploy the firewall policy to achieve flow awareness?

    A. Adaptive Mode

    B. Interface Mode

    C. Enforce Mode

    D. Observe Mode

  • Question 63:

    An ePO administrator wants to enable script scanning in the environment; however, the administrator wants to exclude several custom scripts from being scanned. Which of the following is the BEST practice for script scan exclusions?

    A. Ensure wildcard characters are fully supported.

    B. Use fully qualified domain names and NetBIOS names.

    C. Include port numbers if they are part of the address.

    D. Keep the URL short.

  • Question 64:

    An administrator wants to add executables that are monitored with the Exploit Prevention engine. To which of the following policy sections should the executables be added?

    A. Generic privilege escalation prevention

    B. Exclusions

    C. Signatures

    D. Application protection rules

  • Question 65:

    Security operations has recently received indicators of compromise (IOCs) detailing a new piece of malware for which coverage is not available. The threat advisory recommends a list of file paths and registry keys to prevent this new malware from successfully executing. Which of the following ENS 10.5 features should be used to achieve this goal?

    A. Web Control

    B. Exploit Prevention

    C. Real Protect

    D. Access Protection

  • Question 66:

    Which of the following is the MAIN benefit of using Threat Intelligence Exchange (TIE) and Data Exchange Layer (DXL)?

    A. They enable centralized management of adaptive-threat-protection policies.

    B. They store and pass file reputation to managed endpoints and McAfee products.

    C. They distribute signature-based content to managed systems.

    D. They conduct scanning of files on managed systems for threats.

  • Question 67:

    In which of the following locations are the installation log files stored by default on a Windows machine?

    A. %TEMP%\McAfeeLogs

    B. %PROGRAMDATA%\McAfee\Logs

    C. %USERDATA%\McAfeeLogFiles

    D. %PROGRAMFILES%\CommonFiles\McAfeeLogs

  • Question 68:

    An IT department is looking for a way to optimize performance with on-access scanning. To maximize security and minimize the impact on the system, on-access scanning should be configured to scan files at which of the following frequencies?

    A. Disable on-access scanning.

    B. Let McAfee decide.

    C. Only scan files on write.

    D. Only scan files on read.

  • Question 69:

    By using which of the following techniques does Real Protect scanner inspect suspicious files and activities on an endpoint to detect malicious patterns?

    A. Machine learning

    B. Intrusion prevention

    C. Sandboxing

    D. Static code analysis

  • Question 70:

    A hospital in another county just received a new variant of ransom ware that infected 70% of its systems. After learning the characteristics of this ransom ware, the security team wants to implement a protection policy to stop certain files from being modified and new registry keys from being created that are relevant to the ransom ware. Which of the following policies meets this requirement?

    A. Exploit prevention policy

    B. Block and allow list policy

    C. Access protection policy

    D. Firewall rules policy

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only McAfee exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your MA0-107 exam preparations and McAfee certification application, do not hesitate to visit our Vcedump.com to find your solutions here.