In which of the following locations are the installation log files stored by default on a Windows machine?
A. %TEMP%\McAfeeLogs
B. %PROGRAMDATA%\McAfee\Logs
C. %USERDATA%\McAfeeLogFiles
D. %PROGRAMFILES%\CommonFiles\McAfeeLogs
An ePO administrator decides to define a trusted network in the firewall policy. This will result in:
A. an inbound directional allow rule for that remote network.
B. an outbound directional allow rule for that remote network.
C. a bidirectional allow rule for that remote network.
D. a bidirectional deny rule for that remote network.
Which of the following server roles has a McAfee-defined policy bundled with the product?
A. Exchange
B. Internet Information Services (IIS)
C. Active Directory
D. SQL
After enabling a timed group in the firewall policy, in which of the following ways does the user enable the group?
A. Moving the mouse to the upper-right corner of the screen
B. Running MFEtime.exe from the start menu
C. From the McAfee system tray icon
D. Inside the ENS console
The network operations team has configured the company's VPN connector to deny connectivity if virus scan definitions are older than seven days. In order for a user to immediately meet the VPN connector's policy, which of the following should the administrator enable?
A. Managed custom tasks
B. "Update now" button
C. Default client update task schedule
D. Proxy server
An administrator wants to exclude folder ABC on various drives. In which of the following ways should the administrator list the exclusion in the policy?
A. ??\ABC
B. **\ABC
C. ***\ABC
D. ???\ABC
When planning for a policy migration, in which of the following circumstances should automatic migration be used, rather than manual migration?
A. When fine-tuning assignments
B. When migrating smaller environments
C. When migrating settings to single-platform policies
D. When using multiple custom policies
Dynamic Application Containment uses which of the following attributes of an executable to provide advanced protection?
A. File behavior
B. File name
C. File size
D. File source
An ePO administrator is experiencing issues installing an ENS module on a client machine and decides to investigate by analyzing the install log. In which of the following locations will the administrator find the install log, assuming it is in its default location on the endpoint?
A. %programdata%\mcafee\datreputation\logs
B. **\program files\mcafee\
C. %temp%\mcafeelogs
D. %programdata%\mcafee\Agent\logs
Which of the following describes the difference in functionality between Real Protect cloud-based and Real Protect client-based?
A. The location where the centralized management server and policies are managed
B. The location from which AMCore content updates are pulled before on-demand scans
C. The location where the scanning is conducted on file attributes and behavior
D. The location where malware is quarantined on the managed system