A security administrator is configuring the Enterprise Security Manager (ESM) to comply with corporate security policy and wishes to restrict access to the ESM to certain users and machines Which of the following actions would accomplish this?
When viewing the Policy Tree, what four columns are displayed within the Rules Display pane?
What Firewall component is natively used by the McAfee SIEM appliances to protect the appliances from unauthorized communications?
An organization notices an increasing number of ESM concurrent connection events. To mitigate risks related to concurrent sessions which action should the organization take?
The possibility of both data source Network Interface Cards (NICs) using the shared IP and MAC address at the same time is eliminated by using which of the following?