14.1-10 Flashcards

(30 cards)

1
Q

The CNDOSE uses what to host and manage its virtual machines?

A

VMWare ESX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the virtual machine that provides database services for HBSS?

A

Microsoft SQL (MSSQL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Proactively guards against intrusion by regularly testing the integrity of the network to uncover and fix potential security weaknesses.

A

SCCVI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is used by the DOD to scan assets for compliance?

A

ACAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What GUI is available for easy configuration and management of ESX as well as the virtual machines within?

A

vSphere Client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

To access a virtual machine via vSphere client, select the virtual machine from the left pane and click what?

A

Console Tab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

To allow full-screen view of a virtual machine within the

vSphere client, use what?

A

Console Window

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 4 vSphere client options for a given VM?

A
  1. Power off
  2. Shutdown Guest
  3. Restart Guest
  4. Reset.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the proper boot order for CND-OSE?

A

MSSQL
SCCVI/ACAS
HBSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the anti-virus and anti-spyware solution for endpoints protected by HBSS. It
provides protection against known virus and malware attacks in real time, protection from
blended attacks, and on-demand virus scanning and monitoring capabilities?

A

McAfee VSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What gives administrators the ability to know
when a widespread infection may be occurring, so they will be able to stop the proliferation of
a virus on their networks?

A

Consolidated reported of events,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What provides host based behavioral and signature based treat detection and network intrusion prevention?

A

HBSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Occurs when a program or process stores more data in memory than is provided for, forcing excess data to overflow into adjacent memory areas.

A

Buffer Overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Occurs when a user or organization is deprived of a resource that they would normally expect to have.

A

Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Occurs on a network where the attacker captures

or redirects the communications between two computers.

A

Man-in-the-middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Who have read and write permissions and rights to all operations in HBSS.

A

Global administrators

17
Q

A group of permissions that can be granted to any user or Active Directory by assigning it to those users’ accounts.

A

Permission Sets

18
Q

4 Default Permission Sets

A

Executive Reviewer
Global Reviewer
Group Admin
Group Reviewer

19
Q

Provides view permissions to dashboards, events, and

contacts as well as view information relating to the entire System Tree.

A

Executive Reviewer

20
Q

Provides view permissions across ePO features

A

Group Reviewer

21
Q

What stores systems whose locations could not be determined, and its attributes.

A

Lost + Found

Cannot be deleted or Renamed

22
Q

What allows you to create attribute labels that can be applied to systems manually or
automatically?

23
Q

2 Tag Types

A

Tags Without Criteria

Criteria Based Tags

24
Q

What can broadcast wake-up calls to other McAfee agents located on the same subnet or VLAN.

25
What takes a role in prevention and reporting of an attack, and examples.
Active Point Products | HIPS, DCM, VSE
26
What only detects and reports issues, and examples.
Passive Point Products | ABM, Policy Auditor, RSS
27
What is responsible for the monitoring of Layer 2 traffic on its assigned broadcast domain, often a VLAN.
Rogue System Sensor (RSS)
28
What file contains all the necessary information that a client will need to install the McAfee Agent and communicate with the ePO server, including drivers, ePO server information, and the encryption keys.
framepkg.exe
29
What file has the main HIP service
fireSvc.exe
30
What file has the main DLP Agent logic process
FCAG.exe