VMware
Endpoint Security Complete Implementation – Technical Specialist
250-586
Get certified with the 250-586 exam focusing on Endpoint Security implementations.
195 questions
0 views
Free
Questions 141–150 of 195
You are configuring a policy in VMware Carbon Black. What happens when you set the 'detect only' mode for threats?
-
A
Threats are blocked immediately.
-
B
Alerts are generated for later review.
-
C
No notifications will be sent.
-
D
All threats are quarantined.
Explanation
'Detect only' mode generates alerts without taking action against threats, unlike blocking and quarantining options.
Which service provides malware detection in VMware security setup?
-
A
VMware Carbon Black
-
B
VMware vSphere
-
C
VMware NSX
-
D
VMware vSAN
Explanation
VMware Carbon Black is designed for malware detection, while the others serve different purposes.
A company needs to enforce endpoint compliance in a hybrid environment. What should they utilize?
-
A
VMware Workspace ONE
-
B
VMware Site Recovery
-
C
VMware vCloud Director
-
D
VMware vRealize Operations
Explanation
VMware Workspace ONE provides compliance management, unlike the other options.
You are configuring security policies in VMware. What happens when conflicting policies apply to the same endpoint?
-
A
The endpoint ignores all policies
-
B
Highest priority policy takes effect
-
C
Random policy is applied
-
D
All policies merge into one
Explanation
The highest priority policy will be applied, as VMware security systems prioritize policies based on their settings.
Which service helps secure virtual endpoints in VMware?
-
A
VMware Carbon Black
-
B
VMware vSphere
-
C
VMware NSX
-
D
VMware Workstation
Explanation
VMware Carbon Black provides endpoint security, while others serve different functions.
A company needs to enhance its endpoint security against malware. What should it implement?
-
A
Intrusion Detection Systems
-
B
VMware Endpoint Security Complete
-
C
Data Backup Solutions
-
D
Social Engineering Training
Explanation
VMware Endpoint Security Complete specifically targets enhanced endpoint security, unlike the other options.
You are configuring policies in VMware Endpoint Security. What happens when a device is non-compliant?
-
A
It remains operational but limited
-
B
It is automatically formatted
-
C
It gets network access immediately
-
D
It triggers a security alert
Explanation
A non-compliant device may be limited in functionality, rather than being formatted or gaining immediate access.
Which service in VMware helps to automate compliance checks?
-
A
VMware vRealize Automation
-
B
VMware Horizon
-
C
VMware NSX
-
D
VMware Workspace ONE
Explanation
VMware vRealize Automation automates compliance checks; the others focus on different functionalities.
You are configuring a VDI environment for a business. What is critical to ensure optimal performance?
-
A
Unlimited storage for users
-
B
Low latency network connection
-
C
High CPU clock speed only
-
D
Single data center location
Explanation
A low latency network connection is critical for VDI performance; the other options do not solely ensure optimal performance.
What happens when a user device becomes compromised in a VMware environment?
-
A
It gets automatically isolated
-
B
All data is deleted immediately
-
C
It can still access internal resources
-
D
Security policies remain unchanged
Explanation
Compromised devices are typically isolated to protect resources; the other options incorrectly suggest lack of protective measures.