<< Prev Question Next Question >>

Question 43/70

Alarms using field match as the condition type allow for selected Actions to be taken when the Alarm condition is met. Which of the following McAfee ePolicy Orchestrator (ePO) Actions can be selected when creating such Alarm?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (70q)
Question 1: Zones allow a user to group devices and the events they gene...
Question 2: When viewing the Policy Tree, what four columns are displaye...
Question 3: On the McAfee enterprise Security Manager (ESM), the default...
Question 4: McAfee's SIEM provides awareness of illicit behavior across ...
Question 5: Which of the following is the name of the Dashboard View tha...
Question 6: A SIEM can be effectively used to identify active threats fr...
Question 7: Which of the following two appliances contain Event database...
Question 8: Which of the following ports is the correct choice for use w...
Question 9: Checkpoint firewalls provide logs to the McAfee SIEM Receive...
Question 10: In the Default Summary view on the Enterprise Security manag...
Question 11: When a Correlation Rule successfully triggers, this occurs a...
Question 12: Flow Aggregation is based on which of the following?...
Question 13: Be default, events in McAfee SIEM are aggregated on which of...
Question 14: To correlate known vulnerabilities to devices that are curre...
Question 15: The McAfee Enterprise Security Manager (ESM) system clock is...
Question 16: A SIEM allows an organization the ability to correlate seemi...
Question 17: Which authentication methods can be configured to control al...
Question 18: The ESM supports five Authentication methods. The default lo...
Question 19: The configuration of a receiver has recently been modified a...
Question 20: Which of the following are the three compression ratios avai...
Question 21: While investigating beaconing Malware, an analyst can narrow...
Question 22: If the maximum size for the Policy Change History log is rea...
Question 23: The historical ACE function allows the user to perform retro...
Question 24: In the context of McAfee SIEM, the local protected network a...
Question 25: Analysts can effectively use the McAfee SIEM to identify thr...
Question 26: Which of the following operations is NOT an available select...
Question 27: A McAfee Event Receiver (ERC) will allow for how many Correl...
Question 28: Which of the following are the Boolean logic functions that ...
Question 29: The Global Blacklist feature can be used to block specific t...
Question 30: A backup of the ELM management database captures...
Question 31: An organization notices an increasing number of ESM concurre...
Question 32: The McAfee SIEM baselines daily events over...
Question 33: Reports can be created by selecting the ESM System Propertie...
Question 34: When the automated system backup is configured to include ev...
Question 35: A security administrator is configuring the Enterprise Secur...
Question 36: The ESM database is unavailable for use during...
Question 37: If there is no firewall at the border of the network, which ...
Question 38: Which of the following security technologies sits inline on ...
Question 39: Which of the following is the minimum number of CPUs require...
Question 40: The possibility of both data source Network Interface Cards ...
Question 41: What Firewall component is natively used by the McAfee SIEM ...
Question 42: If the SIEM Administrator deploys the Enterprise Security Ma...
Question 43: Alarms using field match as the condition type allow for sel...
Question 44: The McAfee Enterprise Log Manager (ELM) offers three levels ...
Question 45: Which of the following are the three default users defined w...
Question 46: The security Analyst notices that there has been a large spi...
Question 47: Malware performing a network enumeration scan will be visibl...
Question 48: When preparing to apply a patch to the Enterprise Security M...
Question 49: Where can the ESM event database archive inactive partitions...
Question 50: Event Aggregation is performed on which of the following fie...
Question 51: How often does the configuration and policy data from the pr...
Question 52: Internet perimeter firewall data-sources provide excellent v...
Question 53: When displaying baseline averages using the automatic time r...
Question 54: The fundamental purpose of the Receiver Correlation Subsyste...
Question 55: By default, the McAfee Enterprise Security Manager (ESM) com...
Question 56: When writing custom correlation rules, the analyst should fo...
Question 57: One or more storage allocations, which together specify a to...
Question 58: The normalization value assigned to each data-source event a...
Question 59: Which of the following features of the Enterprise Log Manage...
Question 60: Which of the following is the default port used to communica...
Question 61: The primary function of the Application Data Monitor (ADM) a...
Question 62: Which of the following is the Primary function of the Event ...
Question 63: The Database Event Monitor (DEM) appliance prevents disclosu...
Question 64: The McAfee Advanced Correlation Engine (ACE) can be deployed...
Question 65: Which options within the Receiver properties should be selec...
Question 66: Which of the following statements about Client Data Sources ...
Question 67: The analyst has created a correlation rule to correlate even...
Question 68: The McAfee SIEM solution satisfies which of the following co...
Question 69: Which of the following is the minimum amount of disk space r...
Question 70: With regard to Data Source configuration and event collectio...