VMware

Endpoint Security Complete Implementation – Technical Specialist

250-586

Get certified with the 250-586 exam focusing on Endpoint Security implementations.

195 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 131–140 of 195

Q131

A company needs to isolate a compromised endpoint securely. What should they use?

  • A VMware vMotion
  • B VMware NSX Segmentation
  • C VMware Fusion Networking
  • D VMware Site Recovery
Explanation VMware NSX Segmentation allows secure isolation of compromised endpoints.
Q132

What happens when you enable Application Control in VMware Security?

  • A All applications are blocked immediately
  • B Only signed applications can run
  • C Only system applications are allowed
  • D All applications are allowed by default
Explanation Enabling Application Control typically restricts execution to signed applications only, enhancing security.
Q133

Which service provides endpoint threat detection in VMware security?

  • A VMware Carbon Black
  • B VMware vSphere
  • C VMware Horizon
  • D VMware NSX
Explanation VMware Carbon Black is specifically designed for endpoint detection and response, while others focus on virtualization and networking.
Q134

A company needs to ensure data confidentiality in its virtual environment. Which feature should they enable?

  • A Data Loss Prevention
  • B Virtual Machine Encryption
  • C Network Segmentation
  • D Firewall Configuration
Explanation Virtual Machine Encryption directly protects data within VMs against unauthorized access, unlike the other options.
Q135

What happens when you enable real-time monitoring in VMware security?

  • A Reduces system performance
  • B Increases alert accuracy
  • C Decreases false positives
  • D Stops all background processes
Explanation Real-time monitoring can consume resources, potentially impacting system performance, while other options are not direct outcomes.
Q136

Which service in VMware Carbon Black focuses on persistent endpoint visibility?

  • A Event Monitoring Services
  • B Threat Intelligence Service
  • C Endpoint Detection and Response
  • D Real-Time Behavioral Analysis
Explanation Endpoint Detection and Response provides continuous visibility and monitoring of endpoints, while others focus on specific detections or analysis.
Q137

A company needs to ensure that only approved applications run on its endpoints. Which solution should they implement?

  • A Application Whitelisting
  • B Behavioral Analysis
  • C Full Disk Encryption
  • D Endpoint Backup Solutions
Explanation Application Whitelisting explicitly allows only approved applications, whereas the others do not prevent unapproved applications from running.
Q138

You are configuring VMware Carbon Black policies. What happens when you set a policy to 'Block'?

  • A Quarantine only detected threats
  • B Allow all applications to run
  • C Prevent listed applications from executing
  • D Send alerts without blocking
Explanation 'Block' policies prevent specified applications from running, whereas others either allow execution, quarantine, or only alert.
Q139

Which service is utilized for advanced threat detection in VMware Carbon Black?

  • A Threat Intelligence
  • B Endpoint Detection Response
  • C Network Segmentation
  • D User Behavior Analytics
Explanation Endpoint Detection Response analyzes endpoint activities for threats, while the others serve different purposes.
Q140

A company needs to protect sensitive data on employee devices. What should be the first step?

  • A Implement data encryption.
  • B Deploy web filtering.
  • C Apply endpoint rules.
  • D Conduct employee training.
Explanation Implementing data encryption is crucial for securing sensitive data, while the others enhance security but do not directly protect the data itself.