MA0-103 Exam Information and Guideline
McAfee Certified Product Specialist - DLPE
Below are complete topics detail with latest syllabus and course outline, that will help you good knowledge about exam objectives and topics that you have to prepare. These contents are covered in questions and answers pool of exam.
Exam Title : McAfee Data Loss Prevention Endpoint (DLPe)
Product version(s): 9.3.2
Associated exam : MA0-103
Associated training 4 Days McAfee Data Loss Prevention Endpoint
Number of questions : 60
Exam duration : 140 Minutes
Passing score : 78%
The McAfee Certified Product Specialist certifications are designed for candidates who administer a specific McAfee product or suite of products, and have one to three years of experience with that product or product suite. This certification level allows candidates to demonstrate knowledge in these key product areas:
Basic architecture
Installation
Configuration
Management
Troubleshooting
A minimum of one year of experience using the McAfee product. Recommended hands-on experience includes:
Planning
Design
Installation
Configuration
Operations and management
Individuals who have passed a McAfee certification exam are granted access to the McAfee
Certification Program Candidate site. On the site, you will find:
Your official McAfee Certification
Program transcript and access to the transcript sharing tool.
The ability to download custom certification logos.
Additional information and offers for McAfee-certified individuals
Your contact preferences and profile
News and promotions
Networking
Networking technology theory, principles and practices
Data networking standards and protocols
LAN and WAN technologies
Network administration
Network and routing protocols
Baseline conditions
Perimeter security
Internal network security
Basic infrastructure
Sniffing/network monitoring
TCP/IP and NAT/PAT Systems
Client/server technology
Group policy overview and security templates
Web permissions and authorization
Redundancy/fault tolerance/ high availability
Drive encryption
System administration
Virtual environments
Processors (CPU)
Baseline conditions
System access and navigation
Multi-server environments
Operating systems
Applications
Databases
Redundancy
Web protocols
Baseline conditions
Policies and Procedures
Permissions, delegation & auditing
Policies governing user access
Role permissions
Systems testing procedures
Endpoint protection policies
Exceptions policies
Proactive Protection Scan policy
Antivirus and antispyware protection policies
Network password procedures
Company security policies
Device usage policies
Change control procedures
Product specific maintenance procedures
Incident response procedures
Role specific escalation procedures
Corporate security controls
Corporate security strategy
Device access control
Best Practices
Level of security required
Backup and recovery
Security monitoring
Problem isolation tools/practices
Industry security standards
Security Foundation
Firewall
Computer viruses, spyware, and malware
Network threat prevention technologies
Spyware protection
Firewall technologies and intrusion prevention
Heuristic-based protection
Authentication
Vulnerabilities and remediation techniques
Malware incidents
Internal threats and attacks
External threats and attacks
Security protocols
Cryptography
Network security policies
Network access control
Common threats and vulnerabilities
Operations and Administration
Password management
Network and support management tools and procedures
Patch management
Security alerts, front-line analysis and escalation
Intrusion detection systems
Monitoring tools
Problem determination
Incident and issue categorization
Basic product functions
Product policy configuration
Product report generation
Version controls
Detailed product functions
Protected materials