Questions for the MA0-104 were updated on : Nov 21 ,2025
What Firewall component is natively used by the McAfee SIEM appliances to protect the appliances
from unauthorized communications?
B
Which options within the Receiver properties should be selected to configure the device to respond
to ICMP echo requests?
B
Which of the following is the minimum number of CPUs required to build a virtual image Enterprise
Security Manager (ESM)?
D
Which of the following ports is the correct choice for use when configuring the database properties
of a McAfee Network Security Platform (NSP) Device Data Source?
D
In the context of McAfee SIEM, the local protected network address space is a variable referred to as.
D
If the maximum size for the Policy Change History log is reached, which of the following happens to
new entries?
C
The ESM supports five Authentication methods. The default login option uses the standard
Username and Password format. Which of the following are the other four methods available?
C
The Global Blacklist feature can be used to block specific traffic from which of the following devices?
D
Reports can be created by selecting the ESM System Properties window, the Reports Icon in the top
right of the ESM screen or by which of the following other method selecting the ESM System
Properties window, the Reports Icon in the top right of the ESM screen or by which of the following
other methods within Alarm Creation?
A
Which of the following two appliances contain Event databases?
C
If the SIEM Administrator deploys the Enterprise Security Manager (ESM) using the Federal
Information Processing Standards (FIPS) encryption mode, which of the following types of user
authentication will NOT be compliant with FIPS?
B
A SIEM allows an organization the ability to correlate seemingly disparate streams of traffic into a
central console for analysis. This correlation, in many cases, can point out activities that might
otherwise go undetected This type of detection is also known as
A
Which of the following features of the Enterprise Log Manager (ELM) can alert the user if any data
has been modified?
A
The primary function of the Application Data Monitor (ADM) appliance is to decode traffic at layer
D
With regard to Data Source configuration and event collection what does the acronym CEF stand for?
B