VMware

Endpoint Security Complete Implementation – Technical Specialist

250-586

Get certified with the 250-586 exam focusing on Endpoint Security implementations.

195 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 101–110 of 195

Q101

A company needs to secure their endpoints using VMware and implement multi-factor authentication. Which feature should they enable?

  • A Security Awareness Training
  • B Device Control
  • C User Authentication Policies
  • D Firewall Rules
Explanation User Authentication Policies enables multi-factor authentication; others do not provide this function.
Q102

What happens when a security policy is set to 'block' for a specific application in VMware?

  • A Application is allowed but monitored
  • B Application is entirely disabled
  • C Application performance is throttled
  • D Application is flagged for review
Explanation An application set to 'block' is entirely disabled; others describe different scenarios.
Q103

Which service provides real-time threat detection in VMware?

  • A VMware Carbon Black Cloud
  • B VMware vSphere
  • C VMware Workstation
  • D VMware Horizon
Explanation VMware Carbon Black Cloud offers real-time threat detection, while the others serve different purposes like virtualization or desktop management.
Q104

A company needs to enforce endpoint compliance policies. What solution fits best?

  • A VMware Workspace ONE
  • B VMware NSX
  • C VMware vSAN
  • D VMware App Volumes
Explanation VMware Workspace ONE is designed for endpoint compliance, while the others focus on network security, storage, and application delivery.
Q105

What happens when a file is flagged by the containment feature in VMware Carbon Black?

  • A File is deleted immediately
  • B File is isolated from the system
  • C File becomes read-only
  • D File requires admin password
Explanation Containing a file isolates it to prevent harm, while the other options are not typical containment actions.
Q106

Which service ensures integrity of file system changes in VMware?

  • A File Integrity Monitoring
  • B VMware vCenter Server
  • C App Volume Management
  • D NSX-T Network Security
Explanation File Integrity Monitoring checks changes effectively; others provide different functions.
Q107

A company needs to protect its virtual machines from ransomware. What feature should they enable?

  • A VMware Backup and Restore
  • B Host-based Intrusion Detection
  • C Application Awareness
Explanation Host-based Intrusion Detection directly protects VMs; others do not focus on active threats.
Q108

You are configuring endpoint security. What happens when a device is flagged as non-compliant?

  • A It remains active without restrictions.
  • B It is automatically quarantined.
  • C It receives a notification only.
  • D It may be subject to access restrictions.
Explanation Non-compliant devices typically face restricted access, offering some operational oversight.
Q109

Which service does VMware Carbon Black primarily provide?

  • A Endpoint threat detection and response
  • B Network load balancing
  • C Cloud storage management
  • D Virtual machine orchestration
Explanation Carbon Black focuses on endpoint security, while others do not.
Q110

You are configuring endpoint security policies. What is the first step?

  • A Analyze existing security risks
  • B Deploy agents on endpoints
  • C Select compliance standards
  • D Configure network settings
Explanation Identifying risks is essential before policy creation.