14.14-24 Flashcards

(41 cards)

1
Q

What is created so group admins can have
all permissions required to administer their individual assets while preventing access to
the rest of the ship’s network.

A

Permission Sets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When an administrator deploys with the embarkable

unit, allow them to administer their own assets by?

A

Creating a group admin account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What should you do before embarkables deploy onboard?

A

Work with group admins to remove agents before connecting to your network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What directory contains policies that have been

consolidated for a given module?

A

Comprehensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What two HIP policies are called multiple instance or

“stackable” policies, because multiple policy instances can be assigned to a single node.

A

IPS Rules and Trusted Applications,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When policies are changed in the ePO console, the changes take effect on the managed
systems when?

A

The next agent-server communication interval (ASCI).
30 minutes for smaller networks
60 minutes for larger networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Admins can assign policies in what 3 ways.

A
  1. Site or Group Level
  2. Single System
  3. Node with multiple policies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What prevents admins with appropriate permissions at the same level of the System Tree from
inadvertently replacing a policy

A

Assignment Locking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
PA functions as what because it evaluates systems against standards developed by government and private industry such as DISA’s Security Technical
Implementation Guides (STIG) and Microsoft Best Practices Guides?
A

Independent Auditor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Audits consist of the what 2 components:

A
  1. A benchmark or selected profile within a benchmark

2. An audit frequency or how often data should be gathered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are documents that contain rules for describing the desired state of a system? What format is it? Essentially making them what?

A

Benchmarks
.xccdf
Files dictating what checks to run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What appear in monitors and queries and
include additional information about the state of a system that is helpful to security officers
and network administrators when fixing issues

A

Findings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Audits are benchmarks are supplied from where?

A

McAfee
Can be imported from third-party sources
Created by you using Benchmark Editor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What monitors any specified file for changes but only maintains version changes to text files.
Admin can also: define which files should be tracked. Specify the frequency for detecting file changes

A

File Integrity Monitor

Has ability to retain up to 6 text file versions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

HIPS software requires these 6 components be installed and running to provide and
manage protection.

A
  1. ePO server and repository
  2. McAfee Agent
  3. HIP server components
  4. HIP Agent
  5. HIP content updates
  6. Policies on the server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Log settings for Firewall and IPS Logging include(4):

A
  1. Debug
  2. Information
  3. Warning
  4. Error
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a list of applications that should be considered

“trusted” and thus should cause no event to be generated.

A

Trusted Applications Policy

18
Q

What contains a list of network addresses and subnets that can be tagged as trusted. “Trusted,” means that that address, or address range, can potentially be
ignored by Network IPS and/or the Firewall, without having to created individual exceptions or
rules.

A

Trusted Networks Policy

19
Q

What tab displays exceptions

relevant to the client and provides summary and detailed information for each rule.

A

IPS Policy Tab

20
Q

What tab is used to monitor a list of blocked hosts (IP addresses) that is automatically created when NIPS protection is enabled.

A

Blocked Host Tab

21
Q

What is used to permanently delete contents of the log?

22
Q

What needs to be enabled for an alert to automatically appear when HIPS detects a potential attack.

A

IPS Protection

Display Pop-up Alert Option

23
Q

What provides timelines and settings for tuning your network to avoid false positives?

24
Q

What are the 2 types of tuning?

A

Manual and Automatic

25
McAfee HIP's automatic tuning method. Allows events to go through, then the logged event gets sent to the ePO server during ASCI.
Adaptive Mode
26
What sends a message asking whether to allow or deny an event?
Learn mode
27
What is a pattern that corresponds to a known threat.
Signature
28
What is the process of comparing definitions of what activity is considered normal against observed events to identify significant deviations.
Anomaly-based detection
29
How are the firewall policy rules grouped and why?
By Program of Record(POR) for quick enable or disable.
30
Why does the DC2 server not respond to wake-up calls.
ISA Firewall Rules
31
What only applies when connecting to a network with | particular parameters
A Location-aware firewall rules group
32
What prevents undesirable traffic from accessing a network
Connection Isolation
33
What is a layer of defense solution that inspects user’s actions regarding sensitive content in their work environment.
DLP
34
DLP Management Tools require what | controls.
Net Framework 3.5 | ActiveX
35
DLP Agent generated events are sent to where?
ePO Event Parser
36
Managed — Device classes that can be used in device definitions.
Managed
37
Device classes not used by the device definitions, but whose status the system administrator can change to Managed, as needed.
Unmanaged
38
Device classes that cannot be used by the device definitions because they can affect the managed computer, system health, and efficiency.
Unmanageable includes devices such as battery devices, computer, display adapters, fixed disk drives, monitors, processors, storage volumes, and system devices
39
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\USBSTOR
Registry Key String
40
Minor fixes to the core operating system
Updates
41
Complete system-wide snapshot version increase of all software within HBSS.
Upgrade