Computer Networking > EXAM > ENS 10.5- Essentials exam all answers verified and marked correct 100% (All)

ENS 10.5- Essentials exam all answers verified and marked correct 100%

Document Content and Description Below

ePolicy Orchestrator On-Prem, ePolicy Orchestrator Cloud, ENS Client UI [self-managed] - ANSWER What are the three management platforms supported by Endpoint Security 10.5? Package Manager, ... Self Protection, The McAfee Master Service - ANSWER Which of the following are common components upon which the Endpoint Security product software is installed? rescanned, deleted, cleaned, restored - ANSWER If an action violates an Access Protection rule, the item is placed into quarantine. What four actions can be taken on an item that is in quarantine? Adaptive Threat Protection - ANSWER What optional Endpoint Security module analyzes content from your enterprise and decides what to do based on file reputation, rules, and reputation thresholds? Block, Report, Block and Report - ANSWER Access Protection protects system access points based on configured rules. What 3 rule actions can be configured? The McAfee GetClean tool - ANSWER Which tool can be downloaded and installed to identify and resolve potential issues before installing or upgrading Endpoint Security? - ANSWER For a managed system deployment with McAfee ePolicy Orchestrator On-premises, what 3 content files need to be updated on the ePO server for an ENS installation with ATP?* Mozilla Firefox [3.0 and later], Google Chrome [4.0 and later], Microsoft IE [8,9,10, and 11] - ANSWER When planning a URL installation of Endpoint Security which of the following web browsers are supported on the endpoint systems? ADDLOCAL="fw,tp,wc" /qn or /quiet /unlock <password> - ANSWER When installing ENS on a self-managed system using the command line options, which of the following are installation options that can be selected? McAfee Endpoint Security Firewall McAfee Endpoint Security Web Control McAfee Endpoint Security Threat Prevention McAfee Endpoint Security Platform - ANSWER When verifying the Endpoint Security installation on a self-managed system, which products should appear in the Control Panel Programs and Features list? Select Workstation or Server. Migrate one type now and then the other type later. - ANSWER If you are performing an Automatic Migration with McAfee VirusScan Enterprise policies, which type of policy must be selected first? Server policies, Workstation policies, Client tasks - ANSWER When migrating from McAfee VirusScan Enterprise 8.8 to ENS 10.5, which of the following settings can be migrated? Automatic Migration - ANSWER What type of migration is recommended for networks with fewer than 250 managed systems with little customization from the default settings? Manual Migration - ANSWER What type of migration is recommended for a large network with more than 250 managed systems and complex settings? Install the Endpoint Migration Assistant extensions on the ePO server - ANSWER What action must be taken if Endpoint Migration Assistant is not visible on the ePolicy Orchestrator? 30 days - ANSWER On the ENS client Status page, how many days are included in data on the Threat Summary section? Full Scan / Scan Now, Quick Scan / Scan Now, On-Access Scan / View Detections - ANSWER What options are available when you click the Scan System button at the top of the Endpoint Security client user interface? Quick Scan, Full Scan, Default Client Update - ANSWER WHen configuring Common Tasks on the ENS client, which 3 McAfee-defined tasks are created by default? filter by module, filter by severity - ANSWER When viewing events on the ENS client Event log, how can you filter the events? Self Protection - ANSWER When configuring Debug Logging settings on the ENS client, if you enable debug logging for the Web Control module, debug logging will also be automatically enabled for which other component? The file is placed into the Quarantine folder - ANSWER When the Endpoint Security Threat Prevention module detects a threat in a file that has been scanned, where does the system place the file? Change Action settings - ANSWER When configuring the Threat Prevention module in the Endpoint Security client, what configuration changes can you make to Exploit Prevention Signatures? Full Scan - ANSWER When configuring the Threat Prevention module on the ENS client, what type of scan would you configure to perform a thorough check of all areas of the system? Block, Block and Report, Report - ANSWER When configuring the Threat Prevention module in the ENS client, what actions can be set for an Exploit Prevention signature? Signatures are updated when the Exploit Prevention content file is updated - ANSWER How are Exploit Prevention signatures updated in Endpoint Security? Network, [Show More]

Last updated: 1 year ago

Preview 1 out of 12 pages

Reviews( 0 )

$10.00

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

GET ASSIGNMENT HELP
103
0

Document information


Connected school, study & course


About the document


Uploaded On

Aug 07, 2022

Number of pages

12

Written in

Seller


seller-icon
MARKALLAN

Member since 1 year

55 Documents Sold


Additional information

This document has been written for:

Uploaded

Aug 07, 2022

Downloads

 0

Views

 103

Document Keyword Tags

Recommended For You


$10.00
What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·