A) ELM
B) REC
C) ADM
D) ESM
Correct Answer
verified
Multiple Choice
A) increased usability via views based on category rather than signature ID.
B) more efficient parsing of each event by the McAfee SIEM Receiver.
C) quicker ELM searches.
D) the McAfee ESM database to retain fewer events overall.
Correct Answer
verified
Multiple Choice
A) 100 GB
B) 250 GB
C) 500 GB
D) 1 TB
Correct Answer
verified
Multiple Choice
A) three days
B) five days
C) seven days
D) nine days
Correct Answer
verified
Multiple Choice
A) 365 days.
B) same value as configured on the ELM.
C) 90 Days.
D) all data allowed by system.
Correct Answer
verified
Multiple Choice
A) NOR and AND
B) AND and SET
C) OR and SET
D) OR and AND
Correct Answer
verified
Multiple Choice
A) Receiver Management\Update Device
B) Receiver Configuration\Interface
C) Connection\Status
D) Key Management\ Key Device
Correct Answer
verified
Multiple Choice
A) TRUSTED_NET
B) INTERNAL_NET
C) EXTERNAL_NET
D) HOME_NET
Correct Answer
verified
Multiple Choice
A) MTIE Suspicious and Malicious
B) TSI Suspicious and Malicious
C) GTI Suspicious and Malicious
D) MTI Suspicious and Malicious
Correct Answer
verified
Multiple Choice
A) to analyze data from the ESM and detect matching patterns.
B) to collect and consolidate identical data from the ESM into a single summary event.
C) to classify or categorize data from the Receiver into related types and sub-types.
D) to organize, retrieve and archive data from the Receiver into the SIEM database.
Correct Answer
verified
Multiple Choice
A) 21.
B) 443.
C) 22.
D) 23.
Correct Answer
verified
Multiple Choice
A) McAfee ePlocy Orchestrator (ePO)
B) The core switch
C) The external switch
D) The firewall
Correct Answer
verified
Multiple Choice
A) Default Summary
B) Normalized Dashboard
C) Incidents Dashboard
D) Triggered Alarms
Correct Answer
verified
Multiple Choice
A) to analyze data from the ESM and detect matching patterns.
B) to collect and consolidate identical data from the ESM into a single summary event.
C) to classify or categorize data from the Receiver into related types and sub-types.
D) to organize, retrieve and archive data from the Receiver into the SIEM database.
Correct Answer
verified
Multiple Choice
A) McAfee ePlocy Orchestrator (ePO)
B) The core switch
C) The external switch
D) The firewall
Correct Answer
verified
Multiple Choice
A) 1
B) 3
C) 5
D) 10
Correct Answer
verified
Multiple Choice
A) Collect and parse events before the ESM pulls them form the ERC
B) Collect and parse the events before the receiver forwards them to the ESM
C) Collect and store the events before they are forwarded to the ESM for parsing
D) Collect and parse the events before forwarding them to the ELM
Correct Answer
verified
Multiple Choice
A) Windows Active Directory
B) Radius
C) Lightweight Directory Access Protocol (LDAP)
D) Local Authentication
Correct Answer
verified
Multiple Choice
A) SNMP
B) SSH Key Pair
C) Active Directory
D) Access Groups
Correct Answer
verified
Multiple Choice
A) when no one is logged in; for example, after hours or on weekends.
B) across an unusual range of ports or destinations; for example, all high ports.
C) irregularly; for example, only on Fridays, or only at end-of-quarter.
D) in accordance with expected systems use.
Correct Answer
verified
Showing 21 - 40 of 85
Related Exams