McAfee Product Specialist Questions + Answers

Business, Finance, Economics, Accounting, Operations Management, Computer Science, Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Algebra, Precalculus, Statistics and Probabilty, Advanced Math, Physics, Chemistry, Biology, Nursing, Psychology, Certifications, Tests, Prep, and more.
Post Reply
answerhappygod
Site Admin
Posts: 899603
Joined: Mon Aug 02, 2021 8:13 am

McAfee Product Specialist Questions + Answers

Post by answerhappygod »

Question 1
To meet specific requirements for managed systems in four different regions, an organization has customized several values within DLPE Agent Configuration policies. The four different Agent Configuration policies have been applied to objects in the ePO System
Tree. Prior to an upgrade the four different Agent Configuration policies can be backed up through which of the following methods?
A. The DLP Policy, File, Save as feature
B. The DLP Policy, File, Export Policy to HTML feature
C. The DLP Policy, File, Synchronize Templates feature
D. The McAfee ePolicy Orchestrator Policy Catalog feature


Answer : D

Question 2
How can remote users who are not connected to the corporate network be protected?
A. Enable online reactions within protection rules
B. Enable location-aware rules for offline users
C. Add local users to user assignment groups
D. Enable offline reactions within protection rules


Answer : D

Question 3
Which of the following organizational structures demonstrates strict compliance to
Segregation of Duties?
A. Separate teams for Administration, Operations, Support, and Incident Management
B. Same team for Administration, Operations, Support, and Incident Management
C. Same team for Administration and Operations. Separate teams for Support, and Incident Management
D. Separate teams for Administration, and Operations. Same team for Support and Incident Management


Answer : A

Question 4
Which of the following is NOT a proactive approach to preventing performance issues?
A. Adding exclusions for security and indexing software
B. Removing unnecessary applications and application definitions from the policy
C. Disabling unused modules in Agent Configuration
D. Running a File System Discovery Scan


Answer : D

Question 5
What rule is used to block transfer of protected files sent via Google Chrome Browser?
A. Application Based Tagging Rule
B. Network Communication Protection Rule
C. File System Protection Rule
D. Web Post Protection Rule


Answer : B


Question 6
Which of the following must be restarted after upgrading the ePO extensions for DLPe?
A. McAfee Framework Service
B. ePO Event Parser
C. ePO Application Server
D. ePO Server Service


Answer : B

Question 7
An organization's call center uses shared computers for 24x7 operations. Shifts are staffed by employees and contractors. As part of established business processes employees are authorized to use removable storage devices while contractors are prohibited from using these types of devices. To create flexible Removable Storage Device Rules which type of policy assignment can the DLP Endpoint Administrator configure?
A. Computer Assignment Group policy
B. Local Users policy
C. User Assignment Group
D. Privileged Users policy


Answer : C

Question 8
Which Corporate Security Policy affects the Evidence Share and ePO Database size and growth?
A. Acceptable Use Policy
B. Access Control Policy
C. Data Retention Policy
D. Risk Management Framework


Answer : C

Question 9
Notifying the Manager of a User that triggered an alert is handled by which of the following types of task?
A. Deployment Task
B. Product Update
C. Client Task
D. Incident Task


Answer : D

Question 10
The DLP End point administrator needs to prevent sensitive data from being transmitted over FTP. Which Rule can be configured to meet this requirement?
A. File System Protection Rule
B. Cloud Protection Rule
C. Application File Access Protection Rule
D. Network Communication Protection Rule


Answer : D

Question 11
To determine baseline conditions for DLP implementation, which of the following actions can the DLP End point Administrator perform?
A. Configure database statistics
B. Run the Policy Analyzer
C. Configure backward compatibility
D. Perform testing with various groups


Answer : D

Question 12
McAfee DLP Agent functionality in Windows Safe Mode is controlled by which of the following?
A. DLP Agent Configuration policy
B. ePO Server Settings Page
C. Agent watchdog
D. DLP Global Policy


Answer : A

Question 13
Which of the following DLP features is associated with designating destinations and sources to protect?
A. Text patterns
B. Content Classification
C. Definitions
D. Dictionaries


Answer : C

Question 14
Which of the following McAfee tools are useful to collect McAfee product data from a computer so that the problem can be analyzed and resolved by McAfee Technical
Support?
A. ePO-MVT (McAfee Virtual Technician)
B. Minimum Escalation Requirements (MER) tools
C. McAfee Profiler
D. extra DAT


Answer : B

Question 15
What does DLP Endpoint client use to send operational events and incidents to ePO?
A. DLPe Windows Communication Foundation (WCF) service
B. McAfee Agent
C. ePO Event Parser
D. DLP Endpoint Event Parser


Answer : B


Question 16
Which product feature can the DLP Endpoint Administrator use to help with capacity management for events/incidents?
A. Database Administration
B. Data base statistics
C. DLP Operational Events
D. DLP Incident Manager


Answer : B

Question 17
Applications in which of the following groups will NOT have their Disk Activity scanned for sensitive data?
A. Editor
B. Archiver
C. Installer
D. Trusted


Answer : D

Question 18
Which of the following advanced security settings are the minimum required for replicating files to the Evidence folder?
A. Full control
B. Read/write
C. Create files/write data and create folders/append data
D. List folder/read data


Answer : C

Question 19
When detected, which of the following must be categorized with the highest severity?
A. User makes a purchase online with personal credit cards
B. User emails a copy of a spreadsheet with credit card numbers of all customers to personal email to continue work from home
C. User copies a spreadsheet with credit card numbers of all customers to an encrypted device to continue work from home
D. User files an online form and includes their own personally identifiable information


Answer : B

Question 20
What rule is used to monitor protected file transfer to network shares?
A. Network Communication Protection Rule
B. Network Share Protection Rule
C. File System Protection Rule
D. File System Discovery Rule


Answer : C


Question 21
How can incident data be exported?
A. Select specific events in DLP manager to export incident data
B. Run reports or queries to generate specific report and export incident data
C. Use database administration to export incident data
D. Run incident task manager to export incident data


Answer : B

Question 22
DLPe application strategies, in order of decreasing security, are:
A. Editor, Explorer, Trusted, Archiver
B. Trusted, Explorer, Editor, Archiver
C. Editor, Explorer, Archiver, Trusted
D. Secure, Trusted, Editor, Allow


Answer : A

Question 23
Which of the following ePO server tasks schedules and runs tasks setup in DLP incident manager?
A. DLP Incident Tasks Runner
B. DLP Incident Tasks Executer
C. DLP Policy Push Task
D. DLP Incident Reporting Tasks Runner


Answer : A

Question 24
To remove files from quarantine, which of the following is required?
A. Quarantine release key
B. Restore from quarantine
C. Quarantine purge
D. Agent bypass Code


Answer : A

Question 25
How can different modules within the DLP agent configuration be enabled?
A. Use the miscellaneous section
B. Use the advanced configuration section
C. Use the application modules section
D. Use the user interface service section


Answer : A
Join a community of subject matter experts. Register for FREE to view solutions, replies, and use search function. Request answer by replying!
Post Reply