Intel Security Certified Product Specialist



Similar documents
Intel Security Certified Product Specialist McAfee Network Security Platform (NSP)

Intel Security Certified Product Specialist Data Loss Prevention Endpoint (DLPe)

Intel Security Certified Product Specialist Security Information Event Management (SIEM)

McAfee Certified Product Specialist McAfee epolicy Orchestrator

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

McAfee VirusScan and epolicy Orchestrator Administration Course

Product Guide. McAfee epolicy Orchestrator Software

Product Guide. McAfee epolicy Orchestrator Software

Product Guide. McAfee epolicy Orchestrator Software

McAfee Security Information Event Management (SIEM) Administration Course 101

McAfee Application Control / Change Control Administration Intel Security Education Services Administration Course

McAfee Host Intrusion Prevention Patch 6 Software

McAfee Agent Handler

Release Notes for McAfee epolicy Orchestrator 4.5

McAfee Certified Assessment Specialist Network

Best Practices Guide Revision B. McAfee epolicy Orchestrator Software

McAfee Endpoint Encryption for PC 7.0

Implementing Security Update Management

McAfee Network Security Platform Administration Course

Data Center Connector for vsphere 3.0.0

Installation Guide. McAfee epolicy Orchestrator Software

OMU350 Operations Manager 9.x on UNIX/Linux Advanced Administration

The client transfer between epo servers guide. McAfee Drive Encryption 7.1.3

McAfee DAT Reputation Implementation Guide. Version 1.0 for Enterprise

McAfee Public Cloud Server Security Suite

RSA Security Analytics Certified Administrator (CA) Certification Examination Study Guide

How To Encrypt Files And Folders With A Password Protected By A Password Encrypted By A Safesafe (Mafee) (Eeff) 4

Detecting rogue systems

CMB 207 1I Citrix XenApp and XenDesktop Fast Track

Installing and Administering VMware vsphere Update Manager

Groove Management Server

RSA Archer Certified Administrator (CA) Certification Examination Study Guide

Data Center Connector for OpenStack

McAfee VirusScan Enterprise for Linux Software

McAfee epolicy Orchestrator

POC Installation Guide for McAfee EEFF v4.1.x using McAfee epo 4.6. New Deployments Only Windows Deployment

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services

Upgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2

McAfee epolicy Orchestrator Software

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

Installation Guide Revision B. McAfee epolicy Orchestrator Software

McAfee Solidcore Product Guide

User Guide. FIPS Mode. For use with epolicy Orchestrator 4.6.x Software

McAfee Threat Intelligence Exchange Software

McAfee Client Proxy Software

Installation Guide. McAfee epolicy Orchestrator Software

Installation Guide. McAfee VirusScan Enterprise for Linux Software

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

CNS-301-3I ~ Citrix NetScaler 11 Advanced Implementation

McAfee Client Proxy 2.0

multiple placeholders bound to one definition, 158 page approval not match author/editor rights, 157 problems with, 156 troubleshooting,

Desktop Release Notes. Desktop Release Notes 5.2.1

McAfee Host Data Loss Prevention Administration Intel Security Education Services Administration Course

Installation and Configuration Guide

epolicy Orchestrator Log Files

Table of Contents. Introduction. Audience. At Course Completion

McAfee Endpoint Security Software

McAfee Network Security Platform 8.2

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.

Synchronizer Installation

How McAfee Endpoint Security Intelligently Collaborates to Protect and Perform

Websense Certified Engineer Web Security Professional Examination Specification

McAfee Database Activity Monitoring 5.0.0

RSA SecurID Certified Administrator (RSA Authentication Manager 8.0) Certification Examination Study Guide

VMware vcenter Update Manager Administration Guide

Avalanche Site Edition

Best Practices Guide. McAfee epolicy Orchestrator Software

IBM Endpoint Manager Version 9.1. Patch Management for Red Hat Enterprise Linux User's Guide

What's New in SAS Data Management

CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam

McAfee Asset Manager Console

Oracle Business Intelligence Foundation Suite 11g Essentials Exam Study Guide

Stellar Phoenix Exchange Server Backup

FileMaker Server 13. FileMaker Server Help

Course Outline. Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led

Implementing Cisco IOS Network Security v2.0 (IINS)

Release Notes for McAfee(R) VirusScan(R) Enterprise for Linux Version Copyright (C) 2014 McAfee, Inc. All Rights Reserved.

Building Views and Charts in Requests Introduction to Answers views and charts Creating and editing charts Performing common view tasks

Use Enterprise SSO as the Credential Server for Protected Sites

McAfee Policy Auditor software Installation Guide

Basic knowledge of the Microsoft Windows operating system and its core functionality Working knowledge of Transact-SQL and relational databases

McAfee Data Loss Prevention Endpoint

McAfee Data Loss Prevention Endpoint

Core Protection for Virtual Machines 1

Planning, Deploying, and Managing an Enterprise Project Management Solution

CA Performance Center

Setting Up Resources in VMware Identity Manager

Total Protection for Compliance: Unified IT Policy Auditing

XenClient Enterprise Synchronizer Installation Guide

Configuration Information

Installation Guide. McAfee epolicy Orchestrator Software

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

BlackBerry Enterprise Service 10. Version: Configuration Guide

Central Administration QuickStart Guide

McAfee Advanced Threat Defense 3.6.0

McAfee Web Reporter Turning volumes of data into actionable intelligence

McAfee Directory Services Connector extension

Transcription:

Intel Security ertified Product Specialist McAfee epolicy Orchestrator (epo) Why Get Intel Security ertified? As technology and security threats continue to evolve, organizations are looking for employees with the most up-to-date certifications on the most current techniques and technologies. In a well cited I White Paper, over 70% of IT Managers surveyed felt certifications are valuable for their team and were worth the time and money to maintain. ecoming Intel Security certified distinguishes you from other security professionals and helps validate that you have mastery of the critical skills covered by the certification exams. Earning a certification also your commitment to continued learning and professional growth. About Intel Security ertification Program urrently, Intel offers two industry-recognized certifications as part of our Intel Security ertification Program: Intel Security ertified Product Specialist and Intel Security ertified Security Professional. The Intel Security ertified Product Specialist certifications are designed for candidates who administer a specific McAfee product or suite of products, and have one to three years of experience with that product or product suite. This certification level allows candidates to demonstrate knowledge in the following key product areas: Installation onfiguration Management asic architecture and troubleshooting Highlights This guide has been developed as a resource for your preparation to take the Intel Security ertified Product Specialist epo Exam (MA0-100). The following information is provided: About the Intel Security ertification Program Exam details Suggested resources for exam preparation Knowledge domain topics Sample exam items The Intel Security ertified Security Professional certifications are designed for security practitioners, penetration testers, auditors, consultants, administrators with one to three years of experience. This certification level allows candidates to demonstrate knowledge in the following high-level assessment areas: Profiling and inventorying Vulnerability identification Vulnerability exploitation Expanding influence About This Guide This guide is intended to help prepare you for the Intel Security ertified Security Professional epolicy Orchestrator (epo) exam. For more information about other certification exams or about the Intel Security ertification program go to www.mcafee.com and select For Enterprise, Services, and then Education Services.

Intel Security ertified Product Specialist epolicy Orchestrator (epo) This exam validates that the successful candidate has the knowledge and skills necessary to successfully install, configure, and manage a McAfee epolicy Orchestrator solution. It is intended for security professionals with one to three years of experience using the McAfee epo product and associated technologies. Exam etails Associated exam: MA0-100 Associated Training: McAfee epolicy Orchestrator Administration (4 days) Number of Questions: 115 Exam uration: 140 Minutes Passing Score: 72% Exam Price: $150 US (Exam prices are subject to change. Please visit the following link for exact pricing: http://www. pearsonvue.com/intel/index.asp Exam Preparation Suggested preparation for this exam is: 4 ays McAfee epolicy Orchestrator Administration training (https://mcafee.netexam.com/catalog.html) Minimum of one year using McAfee epolicy Orchestrator Knowledge domains (see later in the guide) Sample questions (see later in the guide) ertificate Registration Intel Security has partnered with Pearson VUE, the global leader in computer-based testing, to administer our certification program. Pearson VUE makes the certification process easy from start to finish. With over 5,000 global locations, you can conveniently test your knowledge and become Intel Security ertified. To register for an exam, go to: http://www.pearsonvue.com/intel/index.asp Exam uration The Intel Security ertification Program has built in time to include the following actions during an exam challenge at each testing facility: Time to answer exam questions Time to review instructions and provide comments after completion Intel Security reserves the right to change the exam content and time requirements at any time. The most accurate means of obtaining this information is to contact the exam delivery provider on the day of your exam challenge. A notification appears on your screen before the exam begins that shows the maximum time allowed for answering the questions in that exam. ertification Transcripts Individuals who have passed an Intel Security certification exam are granted access to the Intel Security ertification Program andidate site. On the site, you will find: Your official Intel Security ertification Program transcript and access to the transcript sharing tool The ability to download custom certification logos Additional information and offers for Intel-certified individuals Your contact preferences and profile News and promotions 2

McAfee epolicy Orchestrator Administration (4 days) Although formal training is not required prior to the exam, the McAfee epolicy Orchestrator Administration (4 days) course is recommended. This course provides in-depth training on how to use McAfee epolicy Orchestrator (epo). At the end of this course, you will be able to plan a McAfee epo deployment, deploy epo within an existing McAfee epolicy Orchestrator environment, and configure epo system components. You will also learn how to use epo to classify, track, protect, and monitor sensitive information. To register for this course, go to: https://mcafee.netexam.com/catalog.html Practical (Hands-on) Experience A minimum of one year of experience using McAfee epo and associated technologies. Recommended hands-on activities include but are not limited to: Architecture design Installation/upgrade onfiguration Management Troubleshooting Technical ServicePortal The Technical ServicePortal provides a single point of access to valuable tools and resources, such as: ocumentation Security bulletins Technical articles Product downloads Tools To access the ServicePortal, go to: https://support.mcafee.com Expert enter ommunity The Expert enter is a community for McAfee product users. Here you will find valuable information for your McAfee products, such as Instructional videos and whitepapers iscussion feeds for experts and other users Guidelines to establish baselines, and to harden your IT environment Ways to expedite monitoring, response, and remediation processes To access the Expert enter, go to: https://community.mcafee.com/community/business/expertcenter 3

Exam Knowledge omains Server Installation and onfiguration Installation (e.g., defaults, ports, components, protocols, encryptions, excluding wizard installation) Web onsole (e.g., browser versions, navigating the UI, cut and paste features, organizing browser) User Accounts Permissions sets Automatic Responses epo Repositories (e.g., source, fallback, superagent, distributed, master) Agent Handlers (e.g., installation and rules) Menu/onfiguration/Server Settings Menu/onfiguration/Registered Servers Server Maintenance and Troubleshooting Server Maintenance, utilities, and server tasks SQL maintenance Log Files Recovery Performance Monitoring Health hecks Product and Policy Management Managing Policies (e.g., duplicating, assigning, creating, deleting, exporting, policy catalog) Super/Agent Policies onfiguration of Product policies Installing extensions Product Maintenance Policy Assignment Rules omparisons (e.g., policy and tasks) lient Tasks (e.g., creating, scheduling, applying, inheritance) Product eployment McAfee Agent Installation (e.g., image, third party deployment) Agent ommunication Other Features (e.g., relay servers, peer to peer, agent to agent, hierarchial) Logging istributed epositories Troubleshooting (e.g., sitelist. xml, duplicate GUI) System Tree reating the System Tree Populating and Sorting the System Tree Tags (e.g., tagging on client tasks/properties/system presorting/reports, tag grouping System Information Rogue Systems etection Queries and Reports reating Queries Generating Reports ashboards/monitors Audit Logs Event Analysis (e.g., threat events, purging, threat analysis) 4

Sample Exam Items The following exam items are provided for review. These items are similar in style and content to those referenced in the Intel Security ertified Product Specialist epo exam. The answers are provided after the questions. 1. Which epo service manages Agent communication? A Event Parser Framework service Tomcat Apache 2. A registered LAP server is used with which of the following authentication types? A SQL authentication Windows authentication ertificate based authentication epo authentication 3. Which of the following is true regarding isaster Recovery? A atabase administrator rights are required to change the Keystore encryption passphrase. The Keystore encryption passphrase is used to encrypt and decrypt the sensitive information stored in the server. isaster Recovery is enabled by default for all database types. The previous passphrase is required to change the Keystore encryption passphrase. 4. Assignment locking prevents: A hanges to the policy at the parent. hanges to client tasks. hanges to inheritance. hanges by users. 5. What task can be configured to copy the contents of one distributed repository into another? A Firewall Rule Firewall Group Firewall Options Firewall atalogs 6. Policies can be imported into epo using which file type? A SV PF HTML XML 7. If a policy assigned to the My Organization group is deleted, what policy is assigned it its place? A McAfee efault Parent Group My efault Global Group 8. How can an epolicy Orchestrator administrator manage assets in a network broadcast segment that cannot communicate directly with the epolicy Orchestrator server? A Enable peer-to-peer communication onvert the agents to super agents Utilize and Agent eployment URL onfigure an agent relay server 5

9. What is the purpose of installing the McAfee Agent in VI mode? A VI mode is used to avoid duplicate GUIs in virtual environments with non-persistent virtual machines VI mode prevents the inadvertent installation of point products that are not compatible with virtual clients VI mode is used to store administrative credentials so that the Agent can be reinstalled if the virtual machine is reprovisioned VI mode is used to provide virtual machines on the same cluster as a source to pull updates in order to save bandwidth 10. What important System Tree property simplifies policy and task administration? A Hierarchy Lock Policy Inheritance Enforcement 11. When configuring Active irectory synchronization, exceptions can be created for which of the following? A Organizational Units Security Groups omain Groups Users 12. When a group has four sorting criteria assigned, the system will be placed into the group when it meets how many of the conditions? A One Two Three Four Answer Key 1. 2. 3. 4. 5. 6. 7. A 8. 9. A 10. 11. A 12. A Intel Security 2821 Mission ollege oulevard Santa lara, A 95054 888 847 8766 www.intelsecurity.com