Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

MA0-104 Intel Security Certified Product Specialist Questions and Answers

Questions 4

When preparing to apply a patch to the Enterprise Security Manager (ESM) and completing the ESM checklist, the command cat/proc7mdstat has been issued to determine RAID functionally The system returns an active drive result identified as [U J What action should be taken?

Options:

A.

Apply the patch, this is a properly functional RAID which can be upgraded.

B.

Apply the patch, drive 1 is active and can be upgraded.

C.

Apply the patch, drive 2 is active and can be upgraded.

D.

Contact support before proceeding with the upgrade.

Buy Now
Questions 5

On the McAfee enterprise Security Manager (ESM), the default data Retention setting specifies that Event and Flow data should be maintained for

Options:

A.

365 days.

B.

same value as configured on the ELM.

C.

90 Days

D.

all data allowed by system

Buy Now
Questions 6

Be default, events in McAfee SIEM are aggregated on which of the following three fields?

Options:

A.

Signature ID, Source IP, Source Port

B.

Signature ID, Source IP, Destination IP

C.

Signature ID, Destination IP, Source User

D.

Signature ID, Event ID, Source IP

Buy Now
Questions 7

Alarms using field match as the condition type allow for selected Actions to be taken when the Alarm condition is met. Which of the following McAfee ePolicy Orchestrator (ePO) Actions can be selected when creating such Alarm?

Options:

A.

Send Events

B.

Collect and Send Properties

C.

Agent Uninstall

D.

Assign Tag with ePO

Buy Now
Questions 8

While investigating beaconing Malware, an analyst can narrow the search quickly by using which of the following watchlists in the McAfee SIEM?

Options:

A.

MTIE Suspicious and Malicious

B.

TSI Suspicious and Malicious

C.

GTI Suspicious and Malicious

D.

MTI Suspicious and Malicious

Buy Now
Questions 9

A SIEM allows an organization the ability to correlate seemingly disparate streams of traffic into a central console for analysis. This correlation, in many cases, can point out activities that might otherwise go undetected This type of detection is also known as

Options:

A.

anomaly based detection

B.

behavioral based detection.

C.

heuristic based detection.

D.

signature based detection

Buy Now
Questions 10

A backup of the ELM management database captures

Options:

A.

ELM configuration settings

B.

ELM configuration settings, and the ELM archive index

C.

ELM configuration settings, the ELM archive index, and all archived ELM contents.

D.

ELM configuration settings, the ELM archive index, and all archived ELM contents up to the ESM database retention limit.

Buy Now
Exam Code: MA0-104
Exam Name: Intel Security Certified Product Specialist
Last Update: Dec 4, 2024
Questions: 70

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99