Week 5 Flashcards
(96 cards)
Two ways to access ESX
- cmd line
- Vsphere client
Primary means of accessing VMs
- console tab
- console window
What does HBSS provide?
- signature and behavior based threat protection
- desktop firewall
What does the McAfee Agent do?
Tells point products what to do
What does HIPS do?
Provides capability to block known intrusion systems
What does RSD do?
- Rogue System Detection
- Notifies admin of any rogue/no agent/wrong agent
What does VSE do?
Active
-protects hosts from viruses, worms, Trojans
What does DCM/DLP do?
Module is what allows/prevents plug and play and USB devices
What does ABM do?
- asset baseline monitor
- passive
- notifies admin when host goes against compose baseline
What does PA do?
- policy auditor
- passive
- notifies admin when policies set in ePO are not enforced on host
Where are polices applied?
System Tree
Characteristics of Lost and Found group
- Cannot be deleted
- Cannot be renamed
- Sorting criteria cannot be changed from being a catch-all group
- Always appears last
- Users must be granted permissions to see contents
- When a system is sorted into L&F, it is placed in a subgroup named for the systems domain. If it doesn’t exist, it will be created
What contains all the necessary information that a client will need to install the McAfee Agent and communicate with ePO server?
Framepkg.exe
What are the HIP sub-agents?
- buffer overflow
- logon
- SQL
- registry
- services
- files
- HTTP
- HIP API
- Get Admin
- Illegal Use
- Program
How often is detected network device information forwarded to the ePO server?
5 minutes
What allows HBSS admins to configure and manage the instances of the rogue system sensor installed throughout the network?
RSD Policy Settings
What are the system statuses?
- Exceptions
- Inactive
- Managed
- Rogue
What are the Rogue System Sensor Statuses?
- Active
- Missing
- Passive
How many Rogue System Sensors should you have?
2 per subnet
What are the Subnet Statuses?
- Contains rogues
- Covered
- Uncovered
What is a policy?
Collection of settings that are created, configured, and then enforced
How are policy settings grouped?
By product then by category
What are the stackable policy rules?
Firewall rules can’t be stacked and only one policy can be applied at a time
How often is policy enforcement?
30 minutes