Black Friday Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > McAfee > ISCPS SIEM > MA0-104

MA0-104 Intel Security Certified Product Specialist Question and Answers

Question # 4

In the Default Summary view on the Enterprise Security manager (ESM). which of the following panels shows the baseline averages?

A.

Event Summary

B.

Normalized Event Summary

C.

Event Distribution

D.

Baseline Average

Full Access
Question # 5

Reports can be created by selecting the ESM System Properties window, the Reports Icon in the top right of the ESM screen or by which of the following other method selecting the ESM System Properties window, the Reports Icon in the top right of the ESM screen or by which of the following other methods within Alarm Creation?

A.

Actions tab

B.

Conditions tab

C.

Escalation tab

D.

Summary tab

Full Access
Question # 6

A McAfee Event Receiver (ERC) will allow for how many Correlation Data Sources to be configured?

A.

1

B.

3

C.

5

D.

10

Full Access
Question # 7

If there is no firewall at the border of the network, which of the following could be used to simulate the protection a firewall provides?

A.

Load balancer

B.

Router Access Control List (ACL)

C.

Switch port blocking

D.

An email gateway

Full Access
Question # 8

Which authentication methods can be configured to control alarm management privileges?

A.

SNMP

B.

SSH Key Pair

C.

Active Directory

D.

Access Groups

Full Access
Question # 9

Which of the following is the default port used to communicate between McAfee SIEM devices?

 

A.

22

B.

222

C.

21

D.

211

Full Access
Question # 10

A SIEM allows an organization the ability to correlate seemingly disparate streams of traffic into a central console for analysis. This correlation, in many cases, can point out activities that might otherwise go undetected This type of detection is also known as

A.

anomaly based detection

B.

behavioral based detection.

C.

heuristic based detection.

D.

signature based detection

Full Access