An administrator wants to add executables that are monitored with the Exploit Prevention engine. To which of the following policy sections should the executables be added?
A. Generic privilege escalation prevention
B. Exclusions
C. Signatures
D. Application protection rules
An ePO administrator wants to enable script scanning in the environment; however, the administrator wants to exclude several custom scripts from being scanned. Which of the following is the BEST practice for script scan exclusions?
A. Ensure wildcard characters are fully supported.
B. Use fully qualified domain names and NetBIOS names.
C. Include port numbers if they are part of the address.
D. Keep the URL short.
An ENS administrator wants the end user to be able to view the web safety information. In addition to enabling Web Control, which of the following describes the requirements for this?
A. The Web Control Plug-in site report must be enabled on the browser toolbar.
B. Content Action settings must be configured to specify the action to apply according to the site rating.
C. The Web Control Plug-in must be enabled in the browser, and "Warn" must be selected in Action Enforcement.
D. The Web Control Plug-in must be enabled in the browser, and the client browser toolbar must be
enabled.
After enabling a timed group in the firewall policy, in which of the following ways does the user enable the group?
A. Moving the mouse to the upper-right corner of the screen
B. Running MFEtime.exe from the start menu
C. From the McAfee system tray icon
D. Inside the ENS console
An ePO administrator needs to add exclusions for a folder. The folder has been created in several locations, including C:\Program Files\Custom\Acme or C:\Program Files\Acme, but the folder could be located in other subfolders in the Program Files folder.
Which of the following is the correct way to write an exclusion for the Acme folder?
A. \Program Files\?\Acme
B. \Program Files\**\Acme
C. \Program Files\*\Acme
D. \Program Files\??\Acme
A user navigates to a website and notices a small blue square around an "M" in the upper-right corner of the Chrome browser. Which of the following does the blue color indicate within the toolbar?
A. It is an internal website.
B. Web Control is disabled.
C. No rating is available.
D. It is a phishing website.
An administrator wants to allow remote users the ability to access the Internet from unsecure WiFi access points to connect to the VPN. Which of the following ENS 10.5 features should the administrator use to accomplish this?
A. Trusted Networks
B. Location-based Groups
C. Timed Groups
D. Connection Isolation Groups
Which of the following groups of legacy products can be migrated to ENS 10.5?
A. VirusScan Enterprise, Host Intrusion Prevention, and SiteAdvisor Enterprise
B. Host Intrusion Prevention, SiteAdvisor Enterprise, and Data Loss Prevention
C. VirusScan Enterprise, Host Intrusion Prevention, and Data Loss Prevention
D. Host Intrusion Prevention, SiteAdvisor Enterprise, and Application Control
An ePO administrator wants to configure system utilization for on-demand scanning to conform to best-practice recommendations based on the ENS Product Guide. To do this, the administrator should:
A. set system utilization to "Normal" for systems with end-user activity and "Low" for systems with large volumes/little end-user activity.
B. set system utilization to "Low" for systems with end-user activity and "Normal" for systems with large volumes/little end-user activity.
C. set system utilization to "Low" for systems with end-user activity and "Low" for systems with large volumes/little end-user activity.
D. set system utilization to "Below Normal" for systems with end-user activity and "Normal" for systems with large volumes/little end-user activity.