Question 6 of 70

Which of the following security technologies sits inline on the network and prevents attacks based on signatures and behavioral analysis that can be configured as a data source within the SIEM?

Answer

Suggested Answer

The suggested answer is D.

Question 7 of 70

Analysts can effectively use the McAfee SIEM to identify threats by

Answer

Suggested Answer

The suggested answer is A.

Question 8 of 70

If there is no firewall at the border of the network, which of the following could be used to simulate the protection a firewall provides?

Answer

Suggested Answer

The suggested answer is B.

Question 9 of 70

When viewing the Policy Tree, what four columns are displayed within the Rules Display pane?

Answer

Suggested Answer

The suggested answer is A.

References:
https://kc.mcafee.com/resources/sites/MCAFEE/content/live/PRODUCT_DOCUMENTATION/25000/PD25748/en_US/esm_950_pg_0-00_en-us.pdf
Page: 287
Question 10 of 70

An organization notices an increasing number of ESM concurrent connection events. To mitigate risks related to concurrent sessions which action should the organization take?

Answer

Suggested Answer

The suggested answer is B.