Computer Networking > EXAM > ENS 10.5- Essentials exam all answers verified and marked correct 100% (All)
ePolicy Orchestrator On-Prem, ePolicy Orchestrator Cloud, ENS Client UI [self-managed] - ANSWER What are the three management platforms supported by Endpoint Security 10.5? Package Manager, ... Self Protection, The McAfee Master Service - ANSWER Which of the following are common components upon which the Endpoint Security product software is installed? rescanned, deleted, cleaned, restored - ANSWER If an action violates an Access Protection rule, the item is placed into quarantine. What four actions can be taken on an item that is in quarantine? Adaptive Threat Protection - ANSWER What optional Endpoint Security module analyzes content from your enterprise and decides what to do based on file reputation, rules, and reputation thresholds? Block, Report, Block and Report - ANSWER Access Protection protects system access points based on configured rules. What 3 rule actions can be configured? The McAfee GetClean tool - ANSWER Which tool can be downloaded and installed to identify and resolve potential issues before installing or upgrading Endpoint Security? - ANSWER For a managed system deployment with McAfee ePolicy Orchestrator On-premises, what 3 content files need to be updated on the ePO server for an ENS installation with ATP?* Mozilla Firefox [3.0 and later], Google Chrome [4.0 and later], Microsoft IE [8,9,10, and 11] - ANSWER When planning a URL installation of Endpoint Security which of the following web browsers are supported on the endpoint systems? ADDLOCAL="fw,tp,wc" /qn or /quiet /unlock <password> - ANSWER When installing ENS on a self-managed system using the command line options, which of the following are installation options that can be selected? McAfee Endpoint Security Firewall McAfee Endpoint Security Web Control McAfee Endpoint Security Threat Prevention McAfee Endpoint Security Platform - ANSWER When verifying the Endpoint Security installation on a self-managed system, which products should appear in the Control Panel Programs and Features list? Select Workstation or Server. Migrate one type now and then the other type later. - ANSWER If you are performing an Automatic Migration with McAfee VirusScan Enterprise policies, which type of policy must be selected first? Server policies, Workstation policies, Client tasks - ANSWER When migrating from McAfee VirusScan Enterprise 8.8 to ENS 10.5, which of the following settings can be migrated? Automatic Migration - ANSWER What type of migration is recommended for networks with fewer than 250 managed systems with little customization from the default settings? Manual Migration - ANSWER What type of migration is recommended for a large network with more than 250 managed systems and complex settings? Install the Endpoint Migration Assistant extensions on the ePO server - ANSWER What action must be taken if Endpoint Migration Assistant is not visible on the ePolicy Orchestrator? 30 days - ANSWER On the ENS client Status page, how many days are included in data on the Threat Summary section? Full Scan / Scan Now, Quick Scan / Scan Now, On-Access Scan / View Detections - ANSWER What options are available when you click the Scan System button at the top of the Endpoint Security client user interface? Quick Scan, Full Scan, Default Client Update - ANSWER WHen configuring Common Tasks on the ENS client, which 3 McAfee-defined tasks are created by default? filter by module, filter by severity - ANSWER When viewing events on the ENS client Event log, how can you filter the events? Self Protection - ANSWER When configuring Debug Logging settings on the ENS client, if you enable debug logging for the Web Control module, debug logging will also be automatically enabled for which other component? The file is placed into the Quarantine folder - ANSWER When the Endpoint Security Threat Prevention module detects a threat in a file that has been scanned, where does the system place the file? Change Action settings - ANSWER When configuring the Threat Prevention module in the Endpoint Security client, what configuration changes can you make to Exploit Prevention Signatures? Full Scan - ANSWER When configuring the Threat Prevention module on the ENS client, what type of scan would you configure to perform a thorough check of all areas of the system? Block, Block and Report, Report - ANSWER When configuring the Threat Prevention module in the ENS client, what actions can be set for an Exploit Prevention signature? Signatures are updated when the Exploit Prevention content file is updated - ANSWER How are Exploit Prevention signatures updated in Endpoint Security? Network, [Show More]
Last updated: 1 year ago
Preview 1 out of 12 pages
Connected school, study & course
About the document
Uploaded On
Aug 07, 2022
Number of pages
12
Written in
This document has been written for:
Uploaded
Aug 07, 2022
Downloads
0
Views
103
In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Browsegrades · High quality services·