Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

McAfee MA0-104 - Intel Security Certified Product Specialist

Page: 1 / 3
Total 70 questions

Which of the following ports is the correct choice for use when configuring the database properties of a McAfee Network Security Platform (NSP) Device Data Source?

A.

1433

B.

5432

C.

9001

D.

3306

The primary function of the Application Data Monitor (ADM) appliance is to decode traffic at layer

A.

one for inspection.

B.

three for inspection.

C.

five for inspection.

D.

seven for inspection.

The possibility of both data source Network Interface Cards (NICs) using the shared IP and MAC address at the same time is eliminated by using which of the following?

A.

iSCSI Adapter

B.

iPMICard

C.

PCI Adapter

D.

SAN Card

By default, the McAfee Enterprise Security Manager (ESM) communicates with the McAfee Event Receiver (ERC) and McAfee Enterprise Log Manager (ELM) over port

A.

21.

B.

443.

C.

22.

D.

23.

Which of the following statements about Client Data Sources is TRUE?

A.

They will have VIPS, Policy and Agent rights.

B.

They will be d splayed on the Receiver Properties > Data Sources table.

C.

They will appear on the System Navigation tree.

D.

They can have independent time zones.

When writing custom correlation rules, the analyst should focus on

A.

multiple security controls and events specific to the environment.

B.

any one specific high-quality indicator of compromise.

C.

malware alerts announced by industry security groups

D.

firewall events, as they provide the first indication of a compromise

Malware performing a network enumeration scan will be visible at the McAfee SIEM as

A.

data -source events.

B.

Application Data Monitor (ADM) events.

C.

Database Event Monitor (DEM) events.

D.

Enhanced Log manager (ELM) entries.

How often does the configuration and policy data from the primary Enterprise Security Manager (ESM) get synchronized with the redundant ESM?

A.

Every 2 minutes

B.

Every 5 minutes

C.

Every 10 minutes

D.

This is based on manual selection

If the SIEM Administrator deploys the Enterprise Security Manager (ESM) using the Federal Information Processing Standards (FIPS) encryption mode, which of the following types of user authentication will NOT be compliant with FIPS?

A.

Windows Active Directory

B.

Radius

C.

Lightweight Directory Access Protocol (LDAP)

D.

Local Authentication

The analyst has created a correlation rule to correlate events from Anti-Virus (AV>, Network Intrusion Prevention (NIPS) and the firewall. While reviewing just firewall events, the analyst notices a large spike in outbound Command and Control traffic, however, the correlation rule is not triggering The analyst then looks at the Network IPS and the Anti-Virus views and notices there are no alerts for this traffic. Which of the following features of NIPS and AV are most likely turned off?

 

A.

Alerting

B.

Heuristics

C.

Advanced Persistent Threats (APT)

D.

Automatic DAT updates