Questions for the MA0-107 were updated on : Nov 21 ,2025
An engineer needs to allow a specific application to run. The engineer just finished creating an
Exploit Prevention process exclusion. After applying the exclusion, the engineer notices the
application is not being run. The following information is provided to the engineer:
Which of the following is the error with the engineer's exclusion?
B
Joe, an administrator, runs a policy-based, on-demand scan on a system and notices that after the
scan, a threat event was created for what appears to be a false positive. Joe wants to submit the file
for analysis to McAfee Labs; but every time he accesses the file, it is detected. In which of the
following default locations can Joe find the backups of the detected files?
A
An ePO administrator wants to configure system utilization for on-demand scanning to conform to
best-practice recommendations based on the ENS Product Guide. To do this, the administrator
should:
A
A security professional is configuring ENS for a client and wants to ensure applications will be
prevented from executing software locally from the browser or email client. Which of the following
McAfee-defined rules should be implemented?
B
After installing ENS on a server, the server administrator finds that a specific application runs very
slow, yet communication flows are still present. Which of the following remediation steps should the
administrator take?
C
Which of the following is the benefit of a TIE server with regard to the Adaptive Threat Protection
module?
A
When configuring the Adaptive Threat Protection Options policy, which of the following is a rule
assignment group that needs to be selected to accommodate an environment consisting of high-
change systems with frequent installations and updates of trusted software?
D
Which of the following fields can an ePO administrator use when creating exclusions for Dynamic
Application Containment?
D
Organizational security policy requires a host-based firewall on endpoints. Some endpoints have
applications where documentation depicting network traffic flows is not readily available. Which of
the following ENS 10.5 firewall features should be used to develop rules for their firewall policy?
B
Which of the following groups of legacy products can be migrated to ENS 10.5?
C
By using which of the following techniques does Real Protect scanner inspect suspicious files and
activities on an endpoint to detect malicious patterns?
B
On Windows 8 and 10 machines, Windows places a flag in the tile of an app, causing Windows to
notify the user of a problem and directing the user to the Windows Store to reinstall. This flag is
placed on the tile when the Threat Prevention scanner detects a threat in the path of an installed
Windows Store app, and marks the application as:
A
The organization's desktop engineering team wants to include ENS 10 within their desktop imaging
process. They would like to install all modules silently. Which of the following is the correct
command-line syntax to accomplish this task?
C
Dynamic Application Containment uses which of the following attributes of an executable to provide
advanced protection?
C
An ENS administrator wants to dynamically create firewall rules required for the environment. In
Enable Firewall Policies/Options, which of the following should be utilized?
C