A hospital in another county just received a new variant of ransom ware that infected 70% of its systems. After learning the characteristics of this ransom ware, the security team wants to implement a protection policy to stop certain files from being modified and new registry keys from being created that are relevant to the ransom ware. Which of the following policies meets this requirement?
A. Exploit prevention policy
B. Block and allow list policy
C. Access protection policy
D. Firewall rules policy
An IT department is looking for a way to optimize performance with on-access scanning. To maximize security and minimize the impact on the system, on-access scanning should be configured to scan files at which of the following frequencies?
A. Disable on-access scanning.
B. Let McAfee decide.
C. Only scan files on write.
D. Only scan files on read.
An ePO administrator wants to enable script scanning in the environment; however, the administrator wants to exclude several custom scripts from being scanned. Which of the following is the BEST practice for script scan exclusions?
A. Ensure wildcard characters are fully supported.
B. Use fully qualified domain names and NetBIOS names.
C. Include port numbers if they are part of the address.
D. Keep the URL short.
An administrator suspects that Self Protection is preventing local installation of a patch. Which of the following log levels should the administrator review?
A. Event logging
B. Debug logging
C. Activity logging
D. High severity logging
If the ePO server's access to the Internet is allowed, which of the following options would the administrator have to check in the McAfee ENS Migration Assistant extension?
A. Software Manager
B. Server Client Package Install
C. Master Repository
D. Workstation Client Package Install
Which of the following components can the Endpoint Migration Assistant tool migrate?
A. Deployment tasks
B. Dashboards
C. Server tasks
D. Host IPS catalog
Which of the following describes the role of a cloud-based Real Protect scanner?
A. It sends environmental variables to the cloud for analysis.
B. It sends potentially malicious code to the cloud for analysis.
C. It sends behavior information to the cloud for analysis.
D. It sends personally identifiable information to the cloud for analysis.
When presented with a file-reputation response prompt, which of the following should a user select when responding to the file-reputation prompt to prevent future prompting for the same file type?
A. Do not show this prompt again.
B. Remember this decision.
C. Allow this selection.
D. Whitelist this selection.
In which of the following ways does Dynamic App Containment protect against malware?
A. It checks for spyware, unwanted programs, and viruses based on known patterns.
B. It monitors communication between the computer and the network.
C. It detects malicious files and activities using machine-learning techniques.
D. It limits the actions unknown applications can take on the end system.
Which of the following describes the difference in functionality between Real Protect cloud-based and Real Protect client-based?
A. The location where the centralized management server and policies are managed
B. The location from which AMCore content updates are pulled before on-demand scans
C. The location where the scanning is conducted on file attributes and behavior
D. The location where malware is quarantined on the managed system