Identify two ways to properly uninstall the McAfee Agent. Select one or more: a. Uninstall the Agent from the ePO System Tree b. Uninstall the Agent from the Client c. Run the Installation Repair tool for the Agent d. Uninstalling the ePO Server to remove all Agents - ✔✔a. Uninstall the Agent from the ePO System Tree b. Uninstall the Agent from the Client _______ is/are located on the individual workstation or the host and uses multiple different modules to monitor, detect, and counter against known cyber threats. (Type in the correct answer in the given blank space. You may type the full correct name, or the acronym.) - ✔✔HBSS There are two different types of cryptographic methods used to decrypt and encrypt data. Based on the given description, match each description to the correct term in the dropdown menus. Has a Shared Secret and Private Key. Both keys are used to do the same task. The same key that encrypts can decrypt, and vice versa Has a Public Key and a Private Key. One key is available to the public, and the other is not. A message encrypted with one key can only be decrypted by the opposite key. PKI uses this method for digital encryption and digital signatures - ✔✔symmetric key asymmetric key asymmetric key Identify which component of HBSS provides a secure communication channel to the ePO and manages all other modules that will be installed on the client. a. McAfee Agent b. Windows Server Update Service (WSUS) c. Virtual Private Networks (VPN) d. Super Agent Update Server (SAUS) - ✔✔McAfee Agent A _______ is an ID that can authenticate your identity in order to access the DoD's unclassified computer networks, applications, and websites, as well as to digitally sign, encrypt, and decrypt unclassified email messages and forms. - ✔✔CAC There are different ways for an Agent to communicate with the ePO server. For each of the methods below, identify the term used to describe that method by selecting the correct choice from the dropdown menus. Occurs within a randomized interval within the first ten minutes of startup. The agent will initiate a communication like to the Administrators send a Wake-Up call to a machine or group of machines. The individual Agent or group of Agents will respond in a randomized time interval. The Agent manually sends information to the ePO server. This is accomplished through the System Tray Icons, or through the Command Line. - ✔✔Communication After Agent Installation Forcing Agent Activity from the Server Forcing Activity from the Client Identify who can upload Audit Files. Select one: a. Anyone with the right permissions b. Only administrators. c. Only authroized organizational users d. Any users can upload Audit Files - ✔✔Anyone with the right permissions Identify what concept provides a framework that consists of Hardware, Software, People, Processes, and Policies, that together help identify/solve Information Security problems. Select one: a. Public Key Infrastructure (PKI) b. DISA Cyber Security Solutions (CSS) c. Information Assurance (IA) d. The Department of Defense - ✔✔a. Public Key Infrastructure (PKI) Identify the four major components of HBSS. Select one or more: a. ePolicy Orchestrator (ePO) Server b. McAfee Agents c. Distributed Repositories d. Registered Servers e. Update Servers f. Local Repositories g. Network Monitors - ✔✔a. ePolicy Orchestrator (ePO) Server b. McAfee Agents c. Distributed Repositories d. Registered Servers ______are kept offline to prevent its Private Key from being compromised. They will then issue certificates for _____________ which are responsible for issuing certificates for __________. - ✔✔Root CA Subordinate CA

 

No comments found.
Login to post a comment
This item has not received any review yet.
Login to review this item
No Questions / Answers added yet.
Price $13.00
Add To Cart

Buy Now
Category exam bundles
Comments 0
Rating
Sales 0

Buy Our Plan

We have

The latest updated Study Material Bundle with 100% Satisfaction guarantee

Visit Now
{{ userMessage }}
Processing