The historical ACE function allows the user to perform retrospective correlations on older data. In
which of the following devices is the data located that the historical correlation engine uses?
A
When preparing to apply a patch to the Enterprise Security Manager (ESM) and completing the ESM
checklist, the command cat/proc7mdstat has been issued to determine RAID functionally The system
returns an active drive result identified as [U J What action should be taken?
D
The McAfee Advanced Correlation Engine (ACE) can t>e deployed in one of two modes which are.?
D
The Database Event Monitor (DEM) appliance prevents disclosure of Personally Identifiable
Information (Pll) by employing which of the following features to those types of information?
C
One or more storage allocations, which together specify a total amount of storage, coupled with a
data retention time that specifies the maximum number of days a log is to be stored, is known as a
B
Which of the following security technologies sits inline on the network and prevents attacks based
on signatures and behavioral analysis that can be configured as a data source within the SIEM?
D
Analysts can effectively use the McAfee SIEM to identify threats by ?
A
If there is no firewall at the border of the network, which of the following could be used to simulate
the protection a firewall provides?
B
When viewing the Policy Tree, what four columns are displayed within the Rules Display pane?
A
An organization notices an increasing number of ESM concurrent connection events. To mitigate risks
related to concurrent sessions which action should the organization take?
B
Which of the following are the three default users defined within the Users and Groups option in the
ESM properties?
D
When displaying baseline averages using the automatic time range option, baseline data is
correlated by using the same time period that is being used for the current query for which of the
following past number of intervals?
C
When the automated system backup is configured to include events, flows and log data, the first
backup will capture all events, flows and logs
D
Event Aggregation is performed on which of the following fields?
C
Alarms using field match as the condition type allow for selected Actions to be taken when the Alarm
condition is met. Which of the following McAfee ePolicy Orchestrator (ePO) Actions can be selected
when creating such Alarm?
D