14.1-10 Flashcards

1
Q

The CNDOSE uses what to host and manage its virtual machines?

A

VMWare ESX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the virtual machine that provides database services for HBSS?

A

Microsoft SQL (MSSQL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Proactively guards against intrusion by regularly testing the integrity of the network to uncover and fix potential security weaknesses.

A

SCCVI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is used by the DOD to scan assets for compliance?

A

ACAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What GUI is available for easy configuration and management of ESX as well as the virtual machines within?

A

vSphere Client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

To access a virtual machine via vSphere client, select the virtual machine from the left pane and click what?

A

Console Tab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

To allow full-screen view of a virtual machine within the

vSphere client, use what?

A

Console Window

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 4 vSphere client options for a given VM?

A
  1. Power off
  2. Shutdown Guest
  3. Restart Guest
  4. Reset.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the proper boot order for CND-OSE?

A

MSSQL
SCCVI/ACAS
HBSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the anti-virus and anti-spyware solution for endpoints protected by HBSS. It
provides protection against known virus and malware attacks in real time, protection from
blended attacks, and on-demand virus scanning and monitoring capabilities?

A

McAfee VSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What gives administrators the ability to know
when a widespread infection may be occurring, so they will be able to stop the proliferation of
a virus on their networks?

A

Consolidated reported of events,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What provides host based behavioral and signature based treat detection and network intrusion prevention?

A

HBSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Occurs when a program or process stores more data in memory than is provided for, forcing excess data to overflow into adjacent memory areas.

A

Buffer Overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Occurs when a user or organization is deprived of a resource that they would normally expect to have.

A

Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Occurs on a network where the attacker captures

or redirects the communications between two computers.

A

Man-in-the-middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Who have read and write permissions and rights to all operations in HBSS.

A

Global administrators

17
Q

A group of permissions that can be granted to any user or Active Directory by assigning it to those users’ accounts.

A

Permission Sets

18
Q

4 Default Permission Sets

A

Executive Reviewer
Global Reviewer
Group Admin
Group Reviewer

19
Q

Provides view permissions to dashboards, events, and

contacts as well as view information relating to the entire System Tree.

A

Executive Reviewer

20
Q

Provides view permissions across ePO features

A

Group Reviewer

21
Q

What stores systems whose locations could not be determined, and its attributes.

A

Lost + Found

Cannot be deleted or Renamed

22
Q

What allows you to create attribute labels that can be applied to systems manually or
automatically?

A

Tags

23
Q

2 Tag Types

A

Tags Without Criteria

Criteria Based Tags

24
Q

What can broadcast wake-up calls to other McAfee agents located on the same subnet or VLAN.

A

Super Agent

25
Q

What takes a role in prevention and reporting of an attack, and examples.

A

Active Point Products

HIPS, DCM, VSE

26
Q

What only detects and reports issues, and examples.

A

Passive Point Products

ABM, Policy Auditor, RSS

27
Q

What is responsible for the monitoring of Layer 2 traffic on its assigned broadcast domain, often a VLAN.

A

Rogue System Sensor (RSS)

28
Q

What file contains all the necessary information that a client will need to install the McAfee Agent and communicate with the ePO server, including drivers, ePO server information, and the encryption keys.

A

framepkg.exe

29
Q

What file has the main HIP service

A

fireSvc.exe

30
Q

What file has the main DLP Agent logic process

A

FCAG.exe