Which of the following are the listed signature severity levels within HIPs? (Select the four that
apply)
ACEF
Which of the following items can be found under the IPS Policy tab in the HIPs Client Ul?
B
Which of the following options cannot be used to define a trusted network?
D
Where are Host IPS custom signatures created?
A
Which of the following HIPs Client features, when enabled, allows the user to make decisions on
allowing or denying traffic to the local host?
D
Which of the following Firewall Rule group options is used to prevent undesirable traffic from
accessing the network by only processing traffic that matches both the "allow rules" above the group
in the Firewall rules list and the group criteria?
C
Which of the following custom signature rule types are used to prevent process termination and
modification?
D
Which of the following items can be found under the IPS Policy tab of the HIPS Client Ul?
B
The time period between the moment vulnerability is identified and a patch is released is commonly
referred to as the ______________window.
B
Which of the following is the default location for the McAfee Agent configuration files?
A