1. Which of the following is a valid statement regarding the task of managing policies in ePO 4.0?

mountainromeInternet and Web Development

Oct 31, 2013 (3 years and 7 months ago)

1,016 views

1.

Which of the following is a valid statement regarding the task of managing policies in ePO 4.0?


a.

The only way to apply an existing policy to a node in the ePO tree is
through inheritance.



b.

When you assign a new policy to a particular node of the Directory, then all systems under that node with inheritance
intact will inherit the new policy.



c.

Policies that have been duplicated can only be applied to the
Directory level in the ePO console.



d.

Policies can be exported or imported from one ePO server to another ePO server.




2.

FILL IN THE BLANKS
-

Communications
between Tomcat and the Web browser accessing the ePO console is accomplished using
_______ traffic through port _______ by default.


a.

HTTPS, 8443



b.

HTTP, 80



c.

SPIPE, 8081



d.

GAME, 8080




3.

By default, which of the following is the communication port between ePO console and ePO server in ePO 4.0?


a.

8443



b.

80



c.

8081



d.

8080




4.

By default, what port is used for the communication between the Sensor and ePO?


a.

80



b.

8081



c.

8444



d.

8043




5.

What are the default ports for communicating from the ePO agent, console, and sensor to the ePO server?


a.

80, 8081, 8084



b.

80, 8082 and 8043



c.

80, 8443 and 8444



d.

8081, 8083, 8443




6.

Which of the following ePO agent and server communication is initiated by the ePO server?


a.

Agent to server Communication Interval (ASCI)



b.

Agent Wakeup Call



c.

Agent Uninstall through ePO console



d.

Agent Policy Enforcement Interval




7.

Select the statement that BEST describes the function of
Rogue System Detection.


a.

Rogue System Detection monitors ePO managed systems on the network.



b.

Rogue System Detection monitors ePO unmanaged systems on the network.



c.

Rogue System Detection monitors non
-
complaint systems that have not been
added to the ePO System Tree.



d.

Rogue System Detection monitors all the systems in the network including the systems that have not been added to the
ePO System Tree.




8.

What protocol is used for secure communication between the ePO agent and server?


a.

IPSEC



b.

SPIPE



c.

SSL



d.

TLS




9.

Which ePO component communicates directly with ePO database in ePO 4.0?


a.

ePO agent



b.

ePO console



c.

ePO server



d.

Rogue System Detection Sensor




10.

Which ePO server task updates ePO distributed repositories from the master repository?


a.

Pull Task



b.

Event Migration



c.

Replication Task



d.

Data Rollup:
Repository




11.

Which file is used by an ePO agent to locate the ePO server?


a.

SiteStat.xml



b.

SiteList.xml



c.

SiteInfo.ini



d.

server.ini




12.

What is the date, 20021201010101, from an agent log file translated into?


a.

December 1, 2002 at 1:01am



b.

December 1, 2002 at 1:01pm



c.

January 10, 2002 at 11:01 pm



d.

January 12, 2002 at 1:01am




13.

Select the component that enforces the Sensor policies on a system.


a.

ePO server



b.

Rogue System Detection Sensor



c.

ePO

McAfee Agent



d.

Sensor Extension




14.

Select the action in the ePO System Tree to safeguard against the Sensor installation on machines with conflicting software.


a.

Rogue Sensor Whitelist Remove



b.

Rogue Sensor Exception



c.

Rogue Sensor Blacklist Add



d.

Rogue Sensor Install Remove




15.

Select the statements that
are TRUE regarding the tags in ePO 4.0. (SELECT THREE)


a.

Criteria
-
based tags can be created to automatically tag systems.



b.

Non
-
criteria based tags use criteria based on any properties sent by ePO agent at each agent to server communication
interval

(ASCI).



c.

Tags can be used to help sort the system tree.



d.

Systems can have multiple tags assigned to them.




16.

Which of the following is the Application
Server log file?


a.

Server.log



b.

EpoApSvr.log



c.

Orion.log



d.

APPServer.log




17.

Which is a characteristic of the ePO SuperAgent?


a.

ePO administrators
must manually enable file sharing on SuperAgent repositories to perform a global updating in ePO.



b.

The SuperAgent Repository uses the credentials of the logged on user for authentication.



c.

In order to perform global updating you must first have

a SuperAgent on all segments.



d.

You can only have one SuperAgent per network segment.




18.

Which ePO component is responsible for the communication between the
ePO console and server?


a.

Tomcat service



b.

Apache service



c.

Event Parser service



d.

Framework service





19.

What is a benefit of the architectural
changes in ePO 4.0? (SELECT TWO)


a.

The number of SQL connections are reduced



b.

Apache service now has fewer responsibilities and no longer needs to handle the communication from ePO agent to the ePO serve
r.



c.

The removal of the Event Parser
service in ePO 4.0, has drastically improved server performance.



d.

The new web
-
based ePO UI has reduced the complexity of the ePO console
.




20.

Which exact
registry key needs to be changed when changing the ePO server logging levels?


a.

HKEY_LOCAL_MACHINE
\
System
\
CurrentControlSet
\
Services
\
Network Associates
\
ePolicy Orchestrator
\
Log



b.

HKEY_LOCAL_MACHINE
\
Software
\
McAfee
\
ePolicy Orchestrator
\
Log
\
Level



c.

HKEY_LOCAL_MACHINE
\
Software
\
Components
\
McAfee
\
ePolicy Orchestrator
\
Log
\
Level



d.

HKEY_LOCAL_MACHINE
\
Software
\
Network Associates
\
ePolicy Orchestrator
\
LogLevel




21.

Without a DHCP server, how many sensors should you install in a 4 subnet network?


a.

1



b.

2



c.

3



d.

4




22.

Select the TRUE statement regarding the Rogue System Detection Sensor.


a.

The Rogue System Detection Sensor must capture all traffic on the network to limit system detection to

devices in the immediate
segment.



b.

Only IP traffic and DHCP responses are captured by the Rogue System Detection Sensor.



c.

The communication between the Sensor and ePO is authenticated HTTPS.



d.

The sensor listens on the network for layer 3

traffic to detect the rogue systems.




23.

Select the TRUE statement that applies to the Lost & Found group in the ePO system tree?


a.

ePO administrators can rename
the Lost & Found Group in the ePO system tree.



b.

ePO administrators can change the sorting criteria of the Lost & Found Group in the ePO system tree.



c.

ePO administrators can break the inheritance by applying a new policy to the individual
systems within the Lost & Found
Group in the ePO system tree.



d.

ePO administrators can delete the Lost & Found Group in the ePO system tree.




24.

How does the
dashboard in ePO 4.0 help ePO administrators?


a.

It provides an interface to schedule server tasks for downloading Anti
-
virus signature files, and also provides a scan engine for internal
repositories.



b.

It provides an interface to import and
synchronize the systems from the Active Directory.



c.

It provides a quick reference of graphical information such as the top 10 systems with infections.



d.

It provides an interface to create multi
-
site administration privileges and feature
-
based
permissions for ePO.




25.

FILL IN THE BLANK
-

Deployment packages are checked into the _______ repository so that ePO can deploy the product.


a.

Master



b.

Source



c.

Fallback



d.

Evaluation




26.

How many Master repositories reside on an ePO server?


a.

One



b.

One for each site in the ePO directory tree



c.

One for
each group in the ePo directory tree



d.

ePO allows administrators to create two master repositories as a measure for fault tolerance.




27.

Select the statement
that is TRUE regarding the Source Repository in ePO.

???


a.

In order for replication to succeed, credentials need to be specified to authenticate to the Source Repository.



b.

The Replication task uses the Source Repository to copy the contents to the
Distributed Repositories.



c.

Only McAfee FTP and HTTP download sites can be designated as a source repository.



d.

The ePO administrator may choose not to use a Source Repository at all in ePO.




28.

FILL IN THE BLANKS
-

The reporting feature in ePO 4.0 is provided by _______, making the connection to the database through
_______.


a.

Crystal reports, Tomcat



b.

Crystal r
eports, Apache



c.

SQUID, Apache



d.

SQUID, Tomcat




29.

Which ePO repository provides all updates to the ePO Master repository?


a.

SuperAgent



b.

Evaluation



c.

Source



d.

Fallback




30.

Which ePO core component enforces the policies on the systems?


a.

ePO console



b.

Apache service



c.

McAfee Agent



d.

Tomcat service




31.

FILL IN THE BLANK
-

By default, active sensors will report their cached detection to the ePO Server every _______.


a.

300 seconds



b.

600
seconds



c.

1800 seconds



d.

3600 seconds




32.

Which ePO Server component is responsible for delivering policies to the agent when the normal Agent to Server
Communication Interval (ASCI) is reached?


a.

Framework service



b.

Tomcat service



c.

Apache service



d.

Event Parser service




33.

Select the TRUE statement
regarding the detection process of the Rogue System Detection Sensor.


a.

The sensor does not report machines with an ePO agent when they are first detected on the network,



b.

To prevent the detection of previously detected systems, the sensor adds
those IP addresses to the IP filter.



c.

The sensor will implement aging by quarantining unmanaged systems after a given length of time.



d.

The sensor packages the information that is gathered about the detected machine into an XML message and sends

it to
the ePO server.




34.

What is the size limit of the MSDE database?


a.

I00 MB



b.

1 GB



c.

2 GB



d.

Unlimited




35.

FILL IN THE BLANK
-

By default, inactive sensors will communicate to the ePO server every _______.


a.

300 seconds



b.

600 seconds



c.

1800 seconds



d.

3600 seconds




36.

What was the primary focus of the architectural changes in ePO 4.0?


a.

To remove the Tomcat service and replace with our own proprietary system



b.

Splitting the

User Interface, functional process logic and data storage into separate modules



c.

To change ePO into a Linux based platform



d.

To take advantage of increased processing power and server resources




37.

What ePO server component caches the ePO agent Policy and Properties to reduce the number of database reads and agent to
server communications?


a.

Tomcat service



b.

Apache
service



c.

Event Parser service



d.

Framework service




38.

How are the sorted systems in the Lost & Found group placed in the ePO system tree?


a.

The are
placed in the root of the Lost & Found group.



b.

The are placed in a subgroup whose name is the name of the computer's domain or workgroup. If no such group exists,
one is created.



c.

The are placed in a subgroup whose IP range includes the IP
address of the computer.



d.

The are placed in a subgroup whose name is the profile of the computer (server or workstation).




39.

Which ePO component gathers the
events from managed systems and communicates them to the ePO server?

????


a.

ePO agent



b.

ePO console



c.

Rogue System Detection Sensor



d.

Tomcat Service




40.

How is the ePO 4.0 console different from previous versions?


a.

It is now web
-
based and designed completely in HTML and JavaScript.



b.

It is now a standalone application, a
nd uses Java code.



c.

It now utilizes the Microsoft Management Console (MMC).



d.

It now provides remote consoles that can be installed on Unix platforms.




41.

How are the server tasks changed in ePO 4.0?


a.

You can chain multiple actions and subactions within a single task.



b.

You can set priorities for server tasks.



c.

Running the Inactive Agent Maintenance task now uninstalls the ePO agent on inactive

agents.



d.

Pull task now updates both the Master and Distributed repositories.




42.

What is the recommended Agent to Server Communication Interval (ASCI) for a
Wireless LAN?


a.

60 minutes



b.

150 minutes



c.

360 minutes



d.

480 minutes