When configuring the Adaptive Threat Protection Options policy, which of the following is a rule assignment group that needs to be selected to accommodate an environment consisting of high-change systems with frequent installations and updates of trusted software?
An IT department is looking for a way to optimize performance with on-access scanning. To maximize security and minimize the impact on the system, on-access scanning should be configured to scan files at which of the following frequencies?
An engineer needs to allow a specific application to run. The engineer just finished creating an Exploit Prevention process exclusion. After applying the exclusion, the engineer notices the application is not being run. The following information is provided to the engineer:
Which of the following is the error with the engineer's exclusion?
While tuning the firewall policy, the ePO administrator notices unauthorized traffic is being initiated by a file transfer utility application. If this is a recently approved application, in which of the following locations should this be configured to allow FTP traffic only with this application?
Which of the following is the benefit of a TIE server with regard to the Adaptive Threat Protection module?
Joe, an administrator, runs a policy-based, on-demand scan on a system and notices that after the scan, a threat event was created for what appears to be a false positive. Joe wants to submit the file for analysis to McAfee Labs; but every time he accesses the file, it is detected. In which of the following default locations can Joe find the backups of the detected files?
When planning for a policy migration, in which of the following circumstances should automatic migration be used, rather than manual migration?