Winter Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

McAfee MA0-101 McAfee Certified Product Specialist - NSP Exam Practice Test

Demo: 13 questions
Total 90 questions

McAfee Certified Product Specialist - NSP Questions and Answers

Question 1

Which domains does a Super User have full rights to access?

Options:

A.

Super Users have full rights to all domains

B.

Super Users have full rights to only the domains in which they reside

C.

Super Users have full rights to only sensor configuration

D.

Super Users have full rights to only Parent domains

Question 2

In double VLAN tagging, a second VLAN tag that is inserted into the frame is referred to as which of the following?

Options:

A.

Customer Identification tag (CD)

B.

VLAN Identification tag (VID)

C.

Outer Identification tag (OID)

D.

Inner Identification tag (HD)

Question 3

Which step needs to be completed before a sensor can be configured?

Options:

A.

Sensor IP addressing must be set

B.

Sensor must be added to the Manager

C.

Sensor username and password must be set

D.

Sensor Gateway addressing must be set

Question 4

Performance debugging mode can be enabled on a sensor for a specified time duration by issuing which of the following CLI commands?

Options:

A.

sensor perf-debug 100

B.

sensor perf-debug on 100

C.

sensor perf-debug Interface all 100

D.

sensor perf-debug assert 100

Question 5

Which of the following deployment modes is not included in standard NAC?

Options:

A.

System Health based NAC

B.

DHCP based NAC

C.

L2 based NAC

D.

L3 based NAC

Question 6

Which of the following are the methods used by NSP to recognize and react to Denial-of-Service (DoS) attacks? (Choose three)

Options:

A.

Blocking

B.

Shutting down the sensor

C.

Thresholds

D.

Self-learning

E.

Logging

F.

DDoS attack tool with exploit signatures

Question 7

_____________________are a set of Access Control List (ACL) rules that define network access provided to a host, subject to Network Access Control.

Options:

A.

Network Access Lists

B.

Network Access Objects

C.

Network Access Zones

D.

Network Access Policy

Question 8

Setting a threshold to allow an IPS to react when traffic volume exceeds the set limit is an example of what type of detection method?

Options:

A.

Signature based

B.

Pattern matching

C.

Denial of Service

D.

Remediation

Question 9

Which sensor action allows the detection and dropping of attacks in real-time?

Options:

A.

Host Quarantine action

B.

ICMP Host unreachable

C.

TCP reset

D.

Drop further packets

Question 10

Which operating mode allows a sensor lo prevent attacks from reaching their intended targets?

Options:

A.

Tap

B.

Span

C.

In-line

D.

Failover

Question 11

Which of the following methods are available for upgrading a Sensor image?

Options:

A.

TFTP and/or through the Manager

B.

PUTTY and/or through the Manager

C.

Console connection and/or through the Manager

D.

TFTP, console connection and/or through the Manager

Question 12

Which mode is used when certain hosts are located on the same network as a sensor and other hosts enter through a router or VPN?

Options:

A.

Mixed

B.

Hybrid

C.

Enforcement

D.

Prevention

Question 13

Which of the following rules do sub-interfaces inherit when they are created?

Options:

A.

ACL rules

B.

Sensor rules only

C.

Port rules only

D.

Sensor and port rules

Demo: 13 questions
Total 90 questions