14.1-10 Flashcards
(30 cards)
The CNDOSE uses what to host and manage its virtual machines?
VMWare ESX
What is the virtual machine that provides database services for HBSS?
Microsoft SQL (MSSQL)
Proactively guards against intrusion by regularly testing the integrity of the network to uncover and fix potential security weaknesses.
SCCVI
What is used by the DOD to scan assets for compliance?
ACAS
What GUI is available for easy configuration and management of ESX as well as the virtual machines within?
vSphere Client
To access a virtual machine via vSphere client, select the virtual machine from the left pane and click what?
Console Tab
To allow full-screen view of a virtual machine within the
vSphere client, use what?
Console Window
What are the 4 vSphere client options for a given VM?
- Power off
- Shutdown Guest
- Restart Guest
- Reset.
What is the proper boot order for CND-OSE?
MSSQL
SCCVI/ACAS
HBSS
What is the anti-virus and anti-spyware solution for endpoints protected by HBSS. It
provides protection against known virus and malware attacks in real time, protection from
blended attacks, and on-demand virus scanning and monitoring capabilities?
McAfee VSE
What gives administrators the ability to know
when a widespread infection may be occurring, so they will be able to stop the proliferation of
a virus on their networks?
Consolidated reported of events,
What provides host based behavioral and signature based treat detection and network intrusion prevention?
HBSS
Occurs when a program or process stores more data in memory than is provided for, forcing excess data to overflow into adjacent memory areas.
Buffer Overflow
Occurs when a user or organization is deprived of a resource that they would normally expect to have.
Denial of Service
Occurs on a network where the attacker captures
or redirects the communications between two computers.
Man-in-the-middle
Who have read and write permissions and rights to all operations in HBSS.
Global administrators
A group of permissions that can be granted to any user or Active Directory by assigning it to those users’ accounts.
Permission Sets
4 Default Permission Sets
Executive Reviewer
Global Reviewer
Group Admin
Group Reviewer
Provides view permissions to dashboards, events, and
contacts as well as view information relating to the entire System Tree.
Executive Reviewer
Provides view permissions across ePO features
Group Reviewer
What stores systems whose locations could not be determined, and its attributes.
Lost + Found
Cannot be deleted or Renamed
What allows you to create attribute labels that can be applied to systems manually or
automatically?
Tags
2 Tag Types
Tags Without Criteria
Criteria Based Tags
What can broadcast wake-up calls to other McAfee agents located on the same subnet or VLAN.
Super Agent