Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

MA0-107 McAfee Certified Product Specialist - ENS Free Practice Exam Questions (2025 Updated)

Prepare effectively for your McAfee MA0-107 McAfee Certified Product Specialist - ENS certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 2
Total 70 questions

An ePO administrator decides to define a trusted network in the firewall policy. This will result in:

A.

an inbound directional allow rule for that remote network.

B.

an outbound directional allow rule for that remote network.

C.

a bidirectional allow rule for that remote network.

D.

a bidirectional deny rule for that remote network.

The ePO administrators have already tuned and configured dynamic application containment rules within the policy. In which of the following ways will dynamic application containment protect against malware once enforcement is enabled?

A.

The scan engine will learn the behavior of the application and send up to GT1 for analysis, and then receive an action to block all actions from the application's process.

B.

If an application's reputation is below the threshold while triggering a block rule and is not an excluded application, malicious behavior of the application will be contained.

C.

The ENS client will receive the reputation as "highly suspicious" from either the McAfee GTI or TIE server, and then immediately uninstall the application on the system.

D.

The adaptive threat protection scanner will send the file automatically to a preconfigured "Sandbox" folder and analyze the application for malicious features before use.

By default, an individual file is flushed from the Adaptive Threat Protection local reputation cache every:

A.

7 days.

B.

14 days.

C.

30 days.

D.

60 days.

In which of the following ways would ATP determine the reputation information if Adaptive Threat Protection (ATP) is deployed and neither a TIE server nor an Internet connection is available?

A.

ATP will use information from the local system.

B.

ATP will query other systems in the environment.

C.

ATP will do nothing and auto-disable itself.

D.

ATP will prompt the user for manual input.

On Windows 8 and 10 machines, Windows places a flag in the tile of an app, causing Windows to notify the user of a problem and directing the user to the Windows Store to reinstall. This flag is placed on the tile when the Threat Prevention scanner detects a threat in the path of an installed Windows Store app, and marks the application as:

A.

malicious.

B.

suspicious.

C.

questionable.

D.

tampered.

If the ePO server's access to the Internet is allowed, which of the following options would the administrator have to check in the McAfee ENS Migration Assistant extension?

A.

Software Manager

B.

Server Client Package Install

C.

Master Repository

D.

Workstation Client Package Install

An administrator is running new software, and a file is detected by the On-Access scanner as a Potentially Unwanted Program. In which of the following ways can the administrator prevent the file from being detected?

A.

Adding the process name within standard process settings

B.

Excluding by detection name

C.

Adding to Potentially Unwanted Program Detections.

D.

Configuring low-risk settings and low risk the software

An administrator wants to add executables that are monitored with the Exploit Prevention engine. To which of the following policy sections should the executables be added?

A.

Generic privilege escalation prevention

B.

Exclusions

C.

Signatures

D.

Application protection rules

An ePO administrator needs to add exclusions for a folder. The folder has been created in several locations, including C:\Program Files\Custom\Acme or C:\Program Files\Acme, but the folder could be located in other subfolders in the Program Files folder. Which of the following is the correct way to write an exclusion for the Acme folder?

A.

\Program Files\?\Acme

B.

\Program Files\**\Acme

C.

\Program Files\*\Acme

D.

\Program Files\??\Acme

The ePO administrator sees the ENS firewall has been disabled on an endpoint in ePO. The end user states that no changes were made to the McAfee products on the endpoint in question. Which of the following questions should the administrator ask the end user about the McAfee icon to validate that the ENS firewall might be disabled?

A.

Is the icon flashing/blinking?

B.

Has the endpoint emitted a notification/alert sound (e.g., an error sound)?

C.

Is there a notification bubble displayed in the system notification area?

D.

Is the icon a color gray with a red/white exclamation mark?

A user is reporting a functional issue with the ENS client. Which of the following logs should be checked?

A.

ExploitPrevention_Debug.log

B.

OnDemandScan_Debug.log

C.

EndpointSecurityPlatform_Errors.log

D.

AdaptiveThreatProtection_Debug.log

When creating an exploit prevention process exclusion, at least one identifier must be specified. Which of the following is an identifier?

A.

DEP

B.

MD5 hash

C.

API

D.

Caller module

A company's security posture requires the ENS firewall to be enabled; however, the team is unsure of communication flows in the environment. In which of the following modes should the ePO administrator deploy the firewall policy to achieve flow awareness?

A.

Adaptive Mode

B.

Interface Mode

C.

Enforce Mode

D.

Observe Mode

When presented with a file-reputation response prompt, which of the following should a user select when responding to the file-reputation prompt to prevent future prompting for the same file type?

A.

Do not show this prompt again.

B.

Remember this decision.

C.

Allow this selection.

D.

Whitelist this selection.

An administrator wants to allow remote users the ability to access the Internet from unsecure WiFi access points to connect to the VPN. Which of the following ENS 10.5 features should the administrator use to accomplish this?

A.

Trusted Networks

B.

Location-based Groups

C.

Timed Groups

D.

Connection Isolation Groups

A user is unable to access a website. The Web Control browser toolbar appears gray. Other websites are accessible. Which of the following features of ENS Web Control has been enabled and is causing the issue?

A.

Block links to risky sites in the search results.

B.

Block phishing pages for all sites.

C.

Block sites that are not verified by GTI.

D.

Block sites by default if the McAfee GTI ratings server is not reachable.

Which of the following describes the role of a cloud-based Real Protect scanner?

A.

It sends environmental variables to the cloud for analysis.

B.

It sends potentially malicious code to the cloud for analysis.

C.

It sends behavior information to the cloud for analysis.

D.

It sends personally identifiable information to the cloud for analysis.

Which of the following fields can an ePO administrator use when creating exclusions for Dynamic Application Containment?

A.

Certificate

B.

Rule

C.

File version

D.

MD5 hash

For which of the following reasons does ENS 10 store two previous versions of AMCore content?

A.

To allow for content rollback if it is needed

B.

To allow for comparison of detections between content versions

C.

To allow for backup when an Extra.DAT is deployed

D.

To allow for choice of which content to scan a file against

Exploit prevention content is released

A.

once per month.

B.

every other week.

C.

once per quarter.

D.

every two months.

Page: 1 / 2
Total 70 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved