A security administrator is configuring the Enterprise Security Manager (ESM) to comply with corporate security policy and wishes to restrict access to the ESM to certain users and machines. Which of the following actions would accomplish this?
A) Configure the Access Control List and setup user accounts
B) Define user groups and set permissions based on IP
C) Assign AD users to computer assignment groups
D) Setup local accounts based on IP Zones
Correct Answer:
Verified
Q25: Which authentication methods can be configured to
Q26: The possibility of both data source Network
Q27: Which of the following is the minimum
Q28: Which of the following two appliances contain
Q29: The primary function of the Application Data
Q31: To correlate known vulnerabilities to devices that
Q32: By default, the McAfee Enterprise Security Manager
Q33: Which of the following features of the
Q34: On the McAfee enterprise Security Manager (ESM),
Q35: The security Analyst notices that there has
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents