While tuning the firewall policy, the ePO administrator notices unauthorized traffic is being initiated by a file transfer utility application. If this is a recently approved application, in which of the following locations should this be configured to allow FTP traffic only with this application?
For which of the following reasons does ENS 10 store two previous versions of AMCore content?
An ePO administrator is experiencing issues installing an ENS module on a client machine and decides to investigate by analyzing the install log. In which of the following locations will the administrator find the install log, assuming it is in its default location on the endpoint?
Which of the following components can the Endpoint Migration Assistant tool migrate?
An administrator wants to know how many machines have exploit prevention enabled. Which of the following dashboards installed with ENS should the administrator look at?
A company's security posture requires the ENS firewall to be enabled; however, the team is unsure of communication flows in the environment. In which of the following modes should the ePO administrator deploy the firewall policy to achieve flow awareness?
A hospital in another county just received a new variant of ransomware that infected 70% of its systems. After learning the characteristics of this ransomware, the security team wants to implement a protection policy to stop certain files from being modified and new registry keys from being created that are relevant to the ransomware. Which of the following policies meets this requirement?
On Windows 8 and 10 machines, Windows places a flag in the tile of an app, causing Windows to notify the user of a problem and directing the user to the Windows Store to reinstall. This flag is placed on the tile when the Threat Prevention scanner detects a threat in the path of an installed Windows Store app, and marks the application as:
A security professional is configuring ENS for a client and wants to ensure applications will be prevented from executing software locally from the browser or email client. Which of the following McAfee-defined rules should be implemented?
If a TIE server is unavailable and the system is connected to the Internet, which of the following components can the Adaptive Threat Protection leverage for reputation decisions?