An administrator is running new software, and a file is detected by the On-Access scanner as a Potentially Unwanted Program. In which of the following ways can the administrator prevent the file from being detected?
Which of the following fields can an ePO administrator use when creating exclusions for Dynamic Application Containment?
A new ENS policy has been created and deployed, and a user contacts the help desk stating that a particular site is no longer accessible. Which of the following ENS Web Control policy categories is the culprit?
Which of the following describes the difference in functionality between Real Protect cloud-based and Real Protect client-based?
Which of the following methods should an administrator enable to address possible buffer overflow conditions?
The ENS administrator wants to monitor remotely the modification of files, but BigFix.exe is generating many false positives. Which of the following should the ENS administrator do?
A security professional is configuring ENS for a client and wants to ensure applications will be prevented from executing software locally from the browser or email client. Which of the following McAfee-defined rules should be implemented?