<< Prev Question Next Question >>

Question 14/70

To correlate known vulnerabilities to devices that are currently exposed to such vulnerabilities, which of the following must be selected on the Receiver?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (70q)
Question 1: Zones allow a user to group devices and the events they gene...
Question 2: When viewing the Policy Tree, what four columns are displaye...
Question 3: On the McAfee enterprise Security Manager (ESM), the default...
Question 4: McAfee's SIEM provides awareness of illicit behavior across ...
Question 5: Which of the following is the name of the Dashboard View tha...
Question 6: A SIEM can be effectively used to identify active threats fr...
Question 7: Which of the following two appliances contain Event database...
Question 8: Which of the following ports is the correct choice for use w...
Question 9: Checkpoint firewalls provide logs to the McAfee SIEM Receive...
Question 10: In the Default Summary view on the Enterprise Security manag...
Question 11: When a Correlation Rule successfully triggers, this occurs a...
Question 12: Flow Aggregation is based on which of the following?...
Question 13: Be default, events in McAfee SIEM are aggregated on which of...
Question 14: To correlate known vulnerabilities to devices that are curre...
Question 15: The McAfee Enterprise Security Manager (ESM) system clock is...
Question 16: A SIEM allows an organization the ability to correlate seemi...
Question 17: Which authentication methods can be configured to control al...
Question 18: The ESM supports five Authentication methods. The default lo...
Question 19: The configuration of a receiver has recently been modified a...
Question 20: Which of the following are the three compression ratios avai...
Question 21: While investigating beaconing Malware, an analyst can narrow...
Question 22: If the maximum size for the Policy Change History log is rea...
Question 23: The historical ACE function allows the user to perform retro...
Question 24: In the context of McAfee SIEM, the local protected network a...
Question 25: Analysts can effectively use the McAfee SIEM to identify thr...
Question 26: Which of the following operations is NOT an available select...
Question 27: A McAfee Event Receiver (ERC) will allow for how many Correl...
Question 28: Which of the following are the Boolean logic functions that ...
Question 29: The Global Blacklist feature can be used to block specific t...
Question 30: A backup of the ELM management database captures...
Question 31: An organization notices an increasing number of ESM concurre...
Question 32: The McAfee SIEM baselines daily events over...
Question 33: Reports can be created by selecting the ESM System Propertie...
Question 34: When the automated system backup is configured to include ev...
Question 35: A security administrator is configuring the Enterprise Secur...
Question 36: The ESM database is unavailable for use during...
Question 37: If there is no firewall at the border of the network, which ...
Question 38: Which of the following security technologies sits inline on ...
Question 39: Which of the following is the minimum number of CPUs require...
Question 40: The possibility of both data source Network Interface Cards ...
Question 41: What Firewall component is natively used by the McAfee SIEM ...
Question 42: If the SIEM Administrator deploys the Enterprise Security Ma...
Question 43: Alarms using field match as the condition type allow for sel...
Question 44: The McAfee Enterprise Log Manager (ELM) offers three levels ...
Question 45: Which of the following are the three default users defined w...
Question 46: The security Analyst notices that there has been a large spi...
Question 47: Malware performing a network enumeration scan will be visibl...
Question 48: When preparing to apply a patch to the Enterprise Security M...
Question 49: Where can the ESM event database archive inactive partitions...
Question 50: Event Aggregation is performed on which of the following fie...
Question 51: How often does the configuration and policy data from the pr...
Question 52: Internet perimeter firewall data-sources provide excellent v...
Question 53: When displaying baseline averages using the automatic time r...
Question 54: The fundamental purpose of the Receiver Correlation Subsyste...
Question 55: By default, the McAfee Enterprise Security Manager (ESM) com...
Question 56: When writing custom correlation rules, the analyst should fo...
Question 57: One or more storage allocations, which together specify a to...
Question 58: The normalization value assigned to each data-source event a...
Question 59: Which of the following features of the Enterprise Log Manage...
Question 60: Which of the following is the default port used to communica...
Question 61: The primary function of the Application Data Monitor (ADM) a...
Question 62: Which of the following is the Primary function of the Event ...
Question 63: The Database Event Monitor (DEM) appliance prevents disclosu...
Question 64: The McAfee Advanced Correlation Engine (ACE) can be deployed...
Question 65: Which options within the Receiver properties should be selec...
Question 66: Which of the following statements about Client Data Sources ...
Question 67: The analyst has created a correlation rule to correlate even...
Question 68: The McAfee SIEM solution satisfies which of the following co...
Question 69: Which of the following is the minimum amount of disk space r...
Question 70: With regard to Data Source configuration and event collectio...