1.
Which of the following security technologies sits inline on the network and prevents attacks based on signatures and behavioral analysis that can be configured as a data source within the SIEM?
2.
Analysts can effectively use the McAfee SIEM to identify threats by
3.
If there is no firewall at the border of the network, which of the following could be used to simulate the protection a firewall provides?
4.
When viewing the Policy Tree, what four columns are displayed within the Rules Display pane?
5.
An organization notices an increasing number of ESM concurrent connection events. To mitigate risks related to concurrent sessions which action should the organization take?
6.
Which of the following are the three default users defined within the Users and Groups option in the ESM properties?
7.
When displaying baseline averages using the automatic time range option, baseline data is correlated by using the same time period that is being used for the current query for which of the following past number of intervals?
8.
When the automated system backup is configured to include events, flows and log data, the first backup will capture all events, flows and logs
9.
Event Aggregation is performed on which of the following fields?
10.
Alarms using field match as the condition type allow for selected Actions to be taken when the Alarm condition is met. Which of the following McAfee ePolicy Orchestrator (ePO) Actions can be selected when creating such Alarm?