What uses a suite of products to monitor, detect, and counter against known
cyber threats that is locally managed by system administrators and configured to
address known exploit traffic? - ANSWER-Host Based Security System (HBSS)
What entity mandated that every single DOD computer must be managed by
HBSS per Cyber Tasking Order 07-12? - ANSWER-USCYBERCOM
What is the client software which allows the ePO server to enforce policies on
client machines? - ANSWER-McAfee Agent
What 2 products are contained in the McAfee ePO server? - ANSWER-SQL
database, Master Repository
What application stores logs, events and policies? - ANSWER-SQL Database
What application stores all installed ePO products on the server as well as
software deploy-able to client machines? - ANSWER-Master Repository
What port is used for Agent to Server communication (TCP)? - ANSWER-80
What port is used for Agent to Server secure Communication (TLS)? - ANSWER-
443
What outbound TCP port is used for the Agent Wakeup Call? - ANSWER-591
What inbound TCP port is used for the Agent Handler Communication? -
ANSWER-8005
, What inbound TCP port is used for the Console-to-Application function (HTTPS)?
- ANSWER-8007
What inbound TCP port is used for Rogue System Detection Sensor over HTTPS?
- ANSWER-8443
What is the SQL Server TCP port? - ANSWER-1433
What is the Default LDAP server port? - ANSWER-389
What is the Default LDAP secure server port? - ANSWER-636
T/F. Per DISAs guidlines the ePO server should be added to the domain -
ANSWER-False
When should the creation of the security key be done? - ANSWER-Immediately
after running the rename script
What contains all of the systems that the ePO manages and is the primary
interface for managing policies and tasks on your systems? - ANSWER-System
Tree
T/F. The System Tree Top level object cannot be deleted. - ANSWER-True
What group in the System Tree stores systems who's location could not be
determined and always appears last in the list? - ANSWER-Lost and Found
Subgroups receive policies and tasks from parent groups through what? -
ANSWER-Inheritance
What file can be used to import systems and groups into the System Tree? -
ANSWER-Text file
What provides a secure communication channel to ePO and manages other point-
products but offers no protection by itself? - ANSWER-McAfee Agent
Agents that are designated to act as a source of content updates to other agents
in the same network are called what? - ANSWER-Super Agents
What is the default time interval that McAfee agent checks in with the ePO
server? - ANSWER-60 minutes
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller tuition. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $11.99. You're not tied to anything after your purchase.