VMware

Endpoint Security Complete Implementation – Technical Specialist

250-586

Get certified with the 250-586 exam focusing on Endpoint Security implementations.

195 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 91–100 of 195

Q91

Which service provides endpoint threat detection in VMware?

  • A VMware Carbon Black
  • B NSX-T Data Center
  • C VMware vRealize
  • D VMware Workspace ONE
Explanation VMware Carbon Black is specifically designed for endpoint threat detection, while the others focus on virtualization or management.
Q92

A company needs to segment its network to enhance security. What VMware technology should they use?

  • A VMware vSphere
  • B VMware NSX
  • C VMware Horizon
  • D VMware vCenter
Explanation VMware NSX is specifically designed for network segmentation and security enforcement.
Q93

You are configuring a policy in VMware Endpoint Security. What happens when you enable 'Audit-only' mode?

  • A Threats are automatically remediated
  • B Incidents are fully reported without blocking
  • C Policies are ignored entirely
  • D Only high-severity alerts are generated
Explanation In 'Audit-only' mode, actions are logged but not enforced, allowing you to monitor without blocking.
Q94

A company needs to ensure endpoint compliance with organizational policies. Which service can help achieve this?

  • A VMware Carbon Black Cloud
  • B VMware vSphere
  • C VMware Horizon
  • D VMware NSX
Explanation VMware Carbon Black Cloud focuses on endpoint compliance and security, while the others cater to different functionalities.
Q95

What happens when endpoint isolation is enabled on VMware Carbon Black?

  • A Prevents all network activity
  • B Restricts network access
  • C Initiates a full system scan
  • D Removes all applications instantly
Explanation Enabling endpoint isolation restricts network access to minimize the spread of potential threats, while others misinterpret this functionality.
Q96

You are configuring incident response policies. Which of the following actions is NOT recommended under strict security guidelines?

  • A Isolate compromised endpoints
  • B Delete all logs immediately
  • C Analyze root cause of incidents
  • D Notify affected users promptly
Explanation Deleting logs is not recommended as it hinders forensic analysis, while the other actions support security best practices.
Q97

Which service provides real-time endpoint detection and response?

  • A VMware Carbon Black
  • B VMware vSphere
  • C VMware Workstation
  • D VMware Horizon
Explanation VMware Carbon Black specializes in real-time threat detection, while others focus on virtualization or remote desktop services.
Q98

A company needs to protect their endpoints from zero-day attacks. Which feature should they prioritize?

  • A Signature-based antivirus
  • B Behavioral threat detection
  • C Firewall policy enforcement
  • D Data encryption
Explanation Behavioral threat detection monitors abnormal behavior, making it effective against zero-day threats unlike signature-based methods.
Q99

What happens when a VMware Endpoint is powered off unexpectedly?

  • A Data loss risks increase
  • B All services cease immediately
  • C No impact on network security
  • D All files are automatically backed up
Explanation Unexpected power off can lead to data loss due to unsaved work, while services won't cease immediately nor will files be backed up automatically.
Q100

Which service is primarily responsible for managing VMware endpoint security policies?

  • A VMware Security Center
  • B VMware Compliance Manager
  • C VMware Endpoint Manager
  • D VMware Threat Detection
Explanation VMware Endpoint Manager manages security policies, while others serve different functions.