HBSS QUESTIONS AND ANSWERS FULLY SOLVED 2023
HBSS QUESTIONS AND ANSWERS FULLY SOLVED 2023 A trusted network may be defined by all of the following except: D. Network Protocol Agent Handlers consist primarily of what two services? C. Apache and Event Parser Also referred to as a Deployment Task, the type of client task that installs products from the master repository to client workstations is: C. Product deployment task An agent will download installation packages or DATS from a specific repository based on : C. McAfee Agent Policy An ENS software bundle is available frim the ePO software manager. From this list which package is not included in the bundle. B. Migration Both the repository Pull Task and the Repository Replication task are: B. Server tasks Deployment packages are non-installable product files that must be manually placed in the repository. B. False Extensions are files that contain components and information needed to manage a product. A. True How do you add an icon to the Navigation Bar of the EPO console? A. Drag and drop the desired item from the cascaded menu to the navigation bar How many sensors must be installed for complete coverage (rogue detection) A. 1 in each broadcast subnet Match the HIPS client processes component to the function field FireS =main hips service FireT = firewall learn mode M = Mcafee validated trusted and protected process One of the principle considerations when planning your system tree is ________________ _____________________, beacuse this directly affects those who maintain the systems and their ability to view and use ePO features. B. Administrator Access Only the dashboard creator can modify/delete a private query A. True Organize systems into logical groupings for policy mangement by: A. By placing them into groups and subgroups Rogue systems are: D. All of the above, Systems that have not communicated within configured time limits Systems that are not managed by a McAfee agent Systems with a McAfee agent but not in the Epo database Tags are like labels that can be applied to: select all that apply: C. Systems The command line switch used from FrmI to remove the McAfee Agent is: A./Remove=Agent The criteria used for criteria-based tags is tsaken from: C. System properties, collected by Mcafee Agent The master repository is always: B. The ePO Server (Spipe) Repository The maximum number of fallback repositories allowed is: D: 1 The McAfee default dashboards are read-only. A. True The top level object in the ePO systemTree is: B. My organization There are two types of tags that you can create, they are: C. Tags without criteria, Criteria based tags To update the Master Repositoryfrom a source site, you would create a: A. Repository pull task What are the three visibility options you have for dashboards? Public, private, and share What is the default authentication method for ePO users? A. ePO authentication What is the deployment system component, the actual software that is deployed and is checked into the ePolicy OrchestratorMaster Repository? A. Packages When can permission sets be assigned? Select all that apply A. When new point products are installed B. When a new user account is created. C. When a new permission set is created D. To any user existing user account Which compnent enforces policies and forwards events for managed systems? A. McAfee Agent Which ENS module acts as a filter between computer and netowrk or internet? A Firewall Which ENS module provides features formerly found in VSE? B. Threat Protection Which of the following are functions of the MacAfee Agent on the client workstation? Choose two A. Provides secure communication between products and ePO C. Gathers events from managed systems and communcates them to the ePO database. Which of the following cane be used to automatically populate and ePO system tree? Select all that apply. A. Text file import into a flat list. B. Synchronization with Active Directory containers C. Synchronization with NT Domain D. Synchronization with Other LDAP based directory Which of the following is a good reason to install an agent handler? B. Communicate woth agents in a DMZ behind a NAT device C. Logically expand ePO infrastructure Which of the following permission sets provides access only to core ePO functionality: C. Group Admin
Geschreven voor
- Instelling
- HBSS
- Vak
- HBSS
Documentinformatie
- Geüpload op
- 16 december 2023
- Aantal pagina's
- 16
- Geschreven in
- 2023/2024
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
hbss questions and answers fully solved 2023
-
a trusted network may be defined by all of the fol
-
an ens software bundle is available frim the epo s
-
how do you add an icon to the navigation bar of th
-
on
Ook beschikbaar in voordeelbundel