An administrator suspects that Self Protection is preventing local installation of a patch. Which of the following log levels should the administrator review?
A. Event logging
B. Debug logging
C. Activity logging
D. High severity logging
A user navigates to a new website that has not been rated by ENS Web Control yet. In which of the following ways will ENS Web Control handle this request by default?
A. Delete
B. Block
C. Allow
D. Warn
An administrator wants to know how many machines have exploit prevention enabled. Which of the following dashboards installed with ENS should the administrator look at?
A. Endpoint Security: Environmental Health
B. Endpoint Security: Threat Behavior
C. Endpoint Security: Content Status
D. Endpoint Security: Installation Status
Which of the following groups of legacy products can be migrated to ENS 10.5?
A. VirusScan Enterprise, Host Intrusion Prevention, and SiteAdvisor Enterprise
B. Host Intrusion Prevention, SiteAdvisor Enterprise, and Data Loss Prevention
C. VirusScan Enterprise, Host Intrusion Prevention, and Data Loss Prevention
D. Host Intrusion Prevention, SiteAdvisor Enterprise, and Application Control
Which of the following is the benefit of a TIE server with regard to the Adaptive Threat Protection module?
A. It communicates with McAfee GTI for file and certificate reputation for malicious code.
B. It is required, and the Adaptive Threat Protection will only work with the TIE server.
C. The Threat Protection cache flushes when the reputation rules change.
D. The stored file and certificate reputations are locally stored, making the remediation automatically quicker.
The organization's desktop engineering team wants to include ENS 10 within their desktop imaging process. They would like to install all modules silently. Which of the following is the correct command-line syntax to accomplish this task?
A. setupEP.exe ADDLOCAL="all" /qb!
B. setupEP.exe ADDLOCAL="all" /qn
C. setupEP.exe ADDLOCAL="fw,tp,wc" /qb!
D. setupEP.exe ADDLOCAL="fw,tp,wc" /qn
An ePO administrator is experiencing issues installing an ENS module on a client machine and decides to investigate by analyzing the install log. In which of the following locations will the administrator find the install log, assuming it is in its default location on the endpoint?
A. %programdata%\mcafee\datreputation\logs
B. **\program files\mcafee\
C. %temp%\mcafeelogs
D. %programdata%\mcafee\Agent\logs
An ENS administrator is configuring on-access protection but finds the trusted backup tool is causing an unneeded performance impact. Which of the following actions should the administrator take?
A. Endpoint Security Threat Prevention Policy Category / Threat Prevention Policy Category / Access Protection / Exclusion / Exclude the Backup Tool executable
B. Endpoint Security Threat Prevention Policy Category / Exploit Prevention/Exclusions / Exclude Backup Tool executable
C. Endpoint Security Threat Prevention Policy Category / On Access scan / Process Settings / Low Risk Processes / Exclude Backup Tool executable
D. Enable McAfee GTI Feedback under Endpoint Security Threat Prevention Policy Category / Options / Proactive Data Analysis
An administrator notices that on one endpoint, Threat Prevention is not currently on the latest version of AMContent. The administrator presses the "Update Now" button within the console, but a message shows the update was unsuccessful.
Which of the following logs should the administrator look at FIRST to troubleshoot the failure?
A. EndpointSecurityPlatform_Activity.log
B. ThreatPrevention_Activity.bg
C. AccessProtection_Activity.log
D. PackageManager_Activity.log
Which of the following describes the difference in functionality between Real Protect cloud-based and Real Protect client-based?
A. The location where the centralized management server and policies are managed
B. The location from which AMCore content updates are pulled before on-demand scans
C. The location where the scanning is conducted on file attributes and behavior
D. The location where malware is quarantined on the managed system